Network attacks are one of the most complicated and major problems in the web. There is a strong need for promoting web security, particularly in the wireless network domain. In this paper, the network security based on the IEEE 802.11 standard has been promoted and discussed. We present our idea on the integration of both access points and a proxy as well as the AES algorithm to provide the network security to a certain degree that the attacker cannot have influence on the network easily.
Published in |
American Journal of Software Engineering and Applications (Volume 5, Issue 3-1)
This article belongs to the Special Issue Advances in Computer Science and Information Technology in Developing Countries |
DOI | 10.11648/j.ajsea.s.2016050301.18 |
Page(s) | 34-39 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2017. Published by Science Publishing Group |
Network Security, IEEE 802.11, Wireless
[1] | R. Bhoyar, M. Ghonge, and S. Gupta, "Comparative Study on IEEE Standard of Wireless LAN/Wi-Fi 802.11 a/b/g/n," International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE), vol. 2, 2013. |
[2] | J. Soryal, I. M. Perera, I. Darwish, N. Fazio, R. Gennaro, and T. Saadawi, Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption, 2014. |
[3] | A. Garg, "IEEE 802.11: Security," ed, 2010. |
[4] | Y. E. H. El Idrissi, N. Zahid, and M. Jedra, "A New EAP Authentication Method for IEEE 802.11 Wireless," IJCSNS, vol. 11, p. 1, 2011. |
[5] | P. J. F. Ruiz, F. B. Hidalgo, J. Santa Lozano, and A. F. Skarmeta, "Deploying ITS Scenarios Providing Security and Mobility Services Based on IEEE 802.11 p Technology," InTech, Feb, 2013. |
[6] | P. K. DEVI, "SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW." |
[7] | M. Mina, A. G. Abdul Azim, and S. Shamala, "Design and implementation of a lightweight security model to prevent IEEE 802.11 Wireless DoS attacks," EURASIP Journal on Wireless Communications and Networking, vol. 2011, 2011. |
[8] | U. Kumar and S. Gambhir, "A Literature Review of Security Threats to Wireless Networks," International Journal of Future Generation Communication & Networking, vol. 7, 2014. |
[9] | A. Reinhardt, D. Seither, A. König, R. Steinmetz, and M. Hollick, "Protecting IEEE 802.11 s wireless mesh networks against insider attacks," in LCN, 2012, pp. 224-227. |
[10] | S. Boyer, J. M. Robert, H. Otrok, and C. Rousseau, "An adaptive tit–for–tat strategy for IEEE 802.11 CSMA/CA protocol," International Journal of Security and Networks, vol. 7, pp. 95-106, 2012. |
[11] | A. Tsitroulis, D. Lampoudis, and E. Tsekleves, "Exposing WPA2 security protocol vulnerabilities," International Journal of Information and Computer Security, vol. 6, pp. 93-107, 2014. |
[12] | G. Kaur and N. Madaan, "A Comparative Study of AES Encryption Decryption," International Journal, 2014. |
[13] | M. Mina, A. G. Abdul Azim, and S. Shamala, "Design of cyberwar laboratory exercises to implement common security attacks against IEEE 802.11 wireless networks," Journal of Computer Systems, Networks, and Communications, vol. 2010, 2011. |
[14] | T. Farooq, D. Jones, and M. Merabti, "MAC Layer DoS Attacks in IEEE 802.11 Networks," in The 11th Annual Conference on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2010), Liverpool, UK, 2010. |
[15] | L. Kurup, M. V. Shah, and M. D. Shah, "Comparative Study of Attacks on Security Protocols," identity, vol. 3, 2014. |
[16] | J. P. de Carvalho, H. Veiga, N. Marques, C. R. Pacheco, and A. Reis, "Laboratory performance of Wi-Fi IEEE 802.11 B, G WPA2 point-to-point links: a case study," in Proceedings of the World Congress on Engineering, 2011. |
APA Style
Zeinab Heidari, Morteza Elme Maryan. (2017). The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard. American Journal of Software Engineering and Applications, 5(3-1), 34-39. https://doi.org/10.11648/j.ajsea.s.2016050301.18
ACS Style
Zeinab Heidari; Morteza Elme Maryan. The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard. Am. J. Softw. Eng. Appl. 2017, 5(3-1), 34-39. doi: 10.11648/j.ajsea.s.2016050301.18
@article{10.11648/j.ajsea.s.2016050301.18, author = {Zeinab Heidari and Morteza Elme Maryan}, title = {The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard}, journal = {American Journal of Software Engineering and Applications}, volume = {5}, number = {3-1}, pages = {34-39}, doi = {10.11648/j.ajsea.s.2016050301.18}, url = {https://doi.org/10.11648/j.ajsea.s.2016050301.18}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajsea.s.2016050301.18}, abstract = {Network attacks are one of the most complicated and major problems in the web. There is a strong need for promoting web security, particularly in the wireless network domain. In this paper, the network security based on the IEEE 802.11 standard has been promoted and discussed. We present our idea on the integration of both access points and a proxy as well as the AES algorithm to provide the network security to a certain degree that the attacker cannot have influence on the network easily.}, year = {2017} }
TY - JOUR T1 - The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard AU - Zeinab Heidari AU - Morteza Elme Maryan Y1 - 2017/08/21 PY - 2017 N1 - https://doi.org/10.11648/j.ajsea.s.2016050301.18 DO - 10.11648/j.ajsea.s.2016050301.18 T2 - American Journal of Software Engineering and Applications JF - American Journal of Software Engineering and Applications JO - American Journal of Software Engineering and Applications SP - 34 EP - 39 PB - Science Publishing Group SN - 2327-249X UR - https://doi.org/10.11648/j.ajsea.s.2016050301.18 AB - Network attacks are one of the most complicated and major problems in the web. There is a strong need for promoting web security, particularly in the wireless network domain. In this paper, the network security based on the IEEE 802.11 standard has been promoted and discussed. We present our idea on the integration of both access points and a proxy as well as the AES algorithm to provide the network security to a certain degree that the attacker cannot have influence on the network easily. VL - 5 IS - 3-1 ER -