2 research outputs found

    Enhanced Wi-Fi Security of University Premises Using MAC Address and Randomly Generated Password

    Get PDF
    Many solutions are available for setting up wireless home networks to get internet connectivity working as quickly as possible. It is also quite risky as numerous security problems can result. Today’s Wi-Fi networking products do not always help the situation as configuring their security features, and they can be time-consuming.  In this paper, an improved security protocol is proposed for University premises, which is a combination of the process of MAC address filtering and random password generation. If the MAC address match, then the server will send a randomly generated password to the client. As a result, the whole network will face fewer intruders, and the security will be of top-notch. The proposed security solution was compared with the existing four security methods. The proposed solution has universality as the device and software needed for it is available all over the world

    Wireless Networks (Attacks ‎‏–‏Security): A Review

    Get PDF
    يعد أمن الشبكات اللاسلكية جزءًا مهمًا ومؤثرًا وفعالًا في حماية الشبكات اللاسلكية من عمليات التطفل والثغرات الأمنية التي يسببها المتسللون والمهاجمون. أجرى هذا البحث مراجعة لمتطلبات أمان الشبكة اللاسلكية، بما في ذلك المصادقة والسرية والتوافر والنزاهة، بالإضافة إلى الهجمات ضد الشبكات اللاسلكية بناءً على هذه المتطلبات، وأبرزها هجوم الرجل في الوسط، والتنصت، وهجوم رفض الخدمة. بالإضافة إلى ذلك، تمت مراجعة بعض الخطوات التي من شأنها حماية وتأمين الشبكات اللاسلكية من هجمات المتطفلين.Wireless network security is an important, influential, and effective part of defending wireless networks from intrusions and security holes caused by hackers and attackers. This paper conducted a review of wireless network security requirements, including authentication, confidentiality, availability, and integrity, as well as attacks against wireless networks based on these requirements, most notably Man in the Middle Attack, Eavesdropping, and Denial of Service attack. In addition, some steps were reviewed that would protect and secure wireless networks from hacker attacks
    corecore