648 research outputs found

    Wireless Handheld Solution for the Gaming Industry

    Get PDF
    of the essential elements of success in the gaming industry is the requirement of providing exceptional customer service. Technology plays a significant role in bringing state of the art solutions that enhance the overall customer experience. Currently a guest must go through multiple steps and a variety of departments to simply resolve issues with their player accounts (loyalty programs), update customer profiles, book hotel and restaurant reservations, sign up for promotions, etc. In order to effectively take care of these customers in both a timely and efficient manner, a wireless handheld device is needed that employees can carry with them to resolve and address these concerns. This project is aimed at identifying the proper wireless infrastructure for the gaming environment and also the wireless handheld device, such as an Ultra Mobile PC (UMPC) to effectively and efficiently take care of customers

    Developing a Systematic Process for Mobile Surveying and Analysis of WLAN security

    Get PDF
    Wireless Local Area Network (WLAN), familiarly known as Wi-Fi, is one of the most used wireless networking technologies. WLANs have rapidly grown in popularity since the release of the original IEEE 802.11 WLAN standard in 1997. We are using our beloved wireless internet connection for everything and are connecting more and more devices into our wireless networks in every form imaginable. As the number of wireless network devices keeps increasing, so does the importance of wireless network security. During its now over twenty-year life cycle, a multitude of various security measures and protocols have been introduced into WLAN connections to keep our wireless communication secure. The most notable security measures presented in the 802.11 standard have been the encryption protocols Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). Both encryption protocols have had their share of flaws and vulnerabilities, some of them so severe that the use of WEP and the first generation of the WPA protocol have been deemed irredeemably broken and unfit to be used for WLAN encryption. Even though the aforementioned encryption protocols have been long since deemed fatally broken and insecure, research shows that both can still be found in use today. The purpose of this Master’s Thesis is to develop a process for surveying wireless local area networks and to survey the current state of WLAN security in Finland. The goal has been to develop a WLAN surveying process that would at the same time be efficient, scalable, and easily replicable. The purpose of the survey is to determine to what extent are the deprecated encryption protocols used in Finland. Furthermore, we want to find out in what state is WLAN security currently in Finland by observing the use of other WLAN security practices. The survey process presented in this work is based on a WLAN scanning method called Wardriving. Despite its intimidating name, wardriving is simply a form of passive wireless network scanning. Passive wireless network scanning is used for collecting information about the surrounding wireless networks by listening to the messages broadcasted by wireless network devices. To collect our research data, we conducted wardriving surveys on three separate occasions between the spring of 2019 and early spring of 2020, in a typical medium-sized Finnish city. Our survey results show that 2.2% out of the located networks used insecure encryption protocols and 9.2% of the located networks did not use any encryption protocol. While the percentage of insecure networks is moderately low, we observed during our study that private consumers are reluctant to change the factory-set default settings of their wireless network devices, possibly exposing them to other security threats

    A Study of Wireless Network Security

    Get PDF
    I intend to make a survey in wireless data security since wireless networks are very common, both for organizations and individuals. Many laptop computers have wireless cards pre-installed. The ability to enter a wireless network has great benefits. However, wireless networking has many security issues. Hackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into wired network. As a result, it\u27s very important that enterprises define effective wireless security policies that guard against unauthorized access to important resources. My survey research may involve these following aspects: wireless network architecture, data security in wireless networks, secure data storage in wireless networks and so forth

    Deployment Issues And Security Concerns With Wireless Local Area Networks: The Deployment Experience At A University

    Get PDF
    This paper presents and discusses various issues pertaining to the deployment of Wireless Local Area Networks (WLANs).  The popularity of WLANs has steadily increased in the last two years and has led to their deployment in a variety of organizations.  Yet, making a business case for WLANs is an important step in their deployment.  In addition to highlighting the need for a business case for WLAN deployment, the paper outlines the reasons for, benefits of, and security problems associated with, their deployment.  The latter part of this paper presents a case study about the deployment of a WLAN at the University of Akron.  Therein, it discusses the context for the deployment, the process that was used to justify the deployment, and the efforts made to protect users’ information from security deficiencies of wireless networks

    Wireless networks

    Get PDF
    This module provides an introduction to wireless networks in general and wireless LANs in particular. It describes and explains what the different wireless technologies are, their main features, security issues, advantages, disadvantages and uses or applications.Peer ReviewedPostprint (published version

    A Review on Requirement of Wireless Sensor Network in Healthcare Applications

    Get PDF
    An assortment of uses depend on Wireless AdHoc and Sensor Networks (WASN) which has pulled in individuals from a wide number of regions demonstrating its utility extents from protection to farming, climate guaging to pre-fiasco discovery, geography to mineralogy, catastrophe alleviation frameworks to medicinal care, vehicle following to territory checking, and a considerable measure many. In the field of therapeutic sciences the uses of WASN are new however have left an incredible effect on the psyches of the two analysts and specialists. Medicinal determination and test examination like observing the patients, detecting exceptional and basic indications physically and rationally should be possible utilizing sensor systems for the therapeutic care. The potential restorative utilizations of WASN are 'Constant, nonstop patient observing', 'Home checking for interminable and elderly patients', 'Gathering of long haul databases of clinical information'. Alternate applications can be giving therapeutic supervision to individuals in remote zones and for detecting vast mischances, fires, fear based oppressor assaults and remote crucial sign checking facilitating the activity of specialists. In this paper we have attempted to make an overview of all the conceivable utilizations of WASN in the field of therapeutic Sciences

    A novel multi-fold security framework for cognitive radio wireless ad-hoc networks

    Get PDF
    Cognitive Radio (CR) Technology has emerged as a smart and intelligent technology to address the problem of spectrum scarcity and its under-utilization. CR nodes sense the environment for vacant channels, exchange control information, and agree upon free channels list (FCL) to use for data transmission and conclusion. CR technology is heavily dependent on the control channel to dialogue on the exchanged control information which is usually in the Industrial-Scientific-Medical (ISM) band. As the ISM band is publically available this makes the CR network more prone to security vulnerabilities and flaws. In this paper a novel multi-fold security framework for cognitive radio wireless ad-hoc networks has been proposed. Multiple security levels, such as, encryption of beacon frame and privately exchanging the FCL, and the dynamic and adaptive behaviour of the framework makes the proposed protocol more resilient and secure against the traditional security attacks when compared with existing protocols
    • …
    corecore