Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


July Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the July 2023 Edition of the journal. The last date of research paper submission is June 15, 2023.

Technologies to Overcome from Intimidation of Wireless Network Security

Kuljeet Kaur Published in

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
Authors Kuljeet Kaur
Download full text
  1. Kuljeet Kaur. Article: Technologies to Overcome from Intimidation of Wireless Network Security. International Journal of Applied Information Systems 2(1):25-29, May 2012. BibTeX

    	author = "Kuljeet Kaur",
    	title = "Article: Technologies to Overcome from Intimidation of Wireless Network Security",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 2,
    	number = 1,
    	pages = "25-29",
    	month = "May",
    	note = "Published by Foundation of Computer Science, New York, USA"


Inbuilt physical security in wireless networks is not obtainable and unfortunately these are more prone to attacks from intruders. Resources are easily accessible, once an unauthorized access is gained. Paper elucidates numerous attacks which an intruder could use to detect and connect to the wireless network. Focus of the paper is on two technologies Wired Equivalent Privacy (WEP) and IEEE 802. 1X Authentication which would secure wireless network from unauthorized access or intimidation. Complete process and authentication components used by WEP and IEEE 802. 1X are elaborated in the paper. Detailed understanding for the client is generated in the paper for planning the wireless security. Paper analyzes the pros and cons of WEP and IEEE 802. 1X and suggests the best practices for securing wireless networks. I have tried to generate an idea that how wireless security could be enhanced through this paper and best practices are also suggested by me


  1. Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham and Sugata Sanyal ," CompChall: Addressing Password Guessing Attacks," http://eprint. iacr. org /2004/136. pdf , 2003
  2. David A. McGrew and Scott R. Fluhrer ,"Multiple forgery attacks against Message Authentication Codes," eprint. iacr. org/2005/161. pdf ,Cisco Systems, Inc. , May 31, 2005
  3. Craig A. Huegen, "Network-Based Denial of Service Attacks," www. pentics. net/ denial-of-service/presentations/. . . /19980209_dos. pp. . .
  4. Alberto Ornaghi, Marco Valleri ,"Man In the Middle Attacks Demos," in BlackHat Conference, USA 2003
  5. "Wired Equivalent Privacy", http://en. wikipedia. org/wiki/Wired_Equivalent_Privacy
  6. "IEEE 802. 1X Authentication", http://www. ja. net/documents/publications/factsheets/064-ieee. 802. 1x. pdf
  7. "Process and Authentication components used by WEP", www. airscanner. com/pubs/wep. pdf
  8. Adam Stubblefield, John Ioannidis, Aviel D. Rubin," Using the Fluhrer, Mantin, and Shamir Attack to Break WEP,"AT&T Labs – Research, Florham Park, NJ. www. isoc. org/isoc/ conferences/ndss/02/papers/stubbl. pdf
  9. "Process and Authentication components used by IEEE 802. 1X Authentication", www. sans. org/. . . /authentication/authentication-authoriza. . . - United StatesSimilar
  10. Configuring IEEE 802. 1x Port-Based Authentication," Catalyst 3750 Switch Software Configuration Guide," http://www. cisco. com/en/US/docs/switches/lan/catalyst3750/software/release/12. 2_40_se/configuration/guide/sw8021x. pdf


Wired Equivalent Privacy, Wireless Network Security