Evaluation of WLAN Security and Performance

Evaluation of WLAN Security and Performance

Author: Alikira Richard

Publisher: GRIN Verlag

Published: 2012-12-06

Total Pages: 42

ISBN-13: 3656331030

DOWNLOAD EBOOK

Research Paper (postgraduate) from the year 2012 in the subject Computer Science - Internet, New Technologies, Kampala International University (School of postgraduate studies/computer department), course: Network security, language: English, abstract: This report addresses the reality of Wireless LAN security and performance. It provides an overview of security mechanisms and explains how security works in Wireless LAN networks. An in depth analysis of the Wired Equivalent Privacy (WEP), Wi-Fi protected access (WPA) and WPA2 standards is presented. The security vulnerabilities that exist in them are analyzed and explained. An experiment involving four devices (Dlink, Linksys, nanostationloco2 and a WBS) was done at Kampala international university. It was discovered from literature that most people prefer using WEP yet it is least secure. One study says 30% of all WLANs detected during network discovery experiment operate with WEP encryption. The study further proved that WEP can be compromised with 100% success. It was also discovered during the experiment that factors such as line of sight, obstruction, distance, antenna type, channel being used all affect network performance. The findings of this experiment can be used as guideline choosing the right encryption method and in designing a WLAN.


CWSP Certified Wireless Security Professional Study Guide

CWSP Certified Wireless Security Professional Study Guide

Author: David D. Coleman

Publisher: John Wiley & Sons

Published: 2016-09-26

Total Pages: 704

ISBN-13: 1119211085

DOWNLOAD EBOOK

The most detailed, comprehensive coverage of CWSP-205 exam objectives CWSP: Certified Wireless Security Professional Study Guide offers comprehensive preparation for the CWSP-205 exam. Fully updated to align with the new 2015 exam, this guide covers all exam objectives and gives you access to the Sybex interactive online learning system so you can go into the test fully confident in your skills. Coverage includes WLAN discovery, intrusion and attack, 802.11 protocol analysis, wireless intrusion prevention system implementation, Layer 2 and 3 VPN over 802.11 networks, managed endpoint security systems, and more. Content new to this edition features discussions about BYOD and guest access, as well as detailed and insightful guidance on troubleshooting. With more than double the coverage of the “official” exam guide, plus access to interactive learning tools, this book is your ultimate solution for CWSP-205 exam prep. The CWSP is the leading vendor-neutral security certification administered for IT professionals, developed for those working with and securing wireless networks. As an advanced certification, the CWSP requires rigorous preparation — and this book provides more coverage and expert insight than any other source. Learn the ins and outs of advanced network security Study 100 percent of CWSP-205 objectives Test your understanding with two complete practice exams Gauge your level of preparedness with a pre-test assessment The CWSP is a springboard for more advanced certifications, and the premier qualification employers look for in the field. If you’ve already earned the CWTS and the CWNA, it’s time to take your career to the next level. CWSP: Certified Wireless Security Professional Study Guide is your ideal companion for effective, efficient CWSP-205 preparation.


CWSP Certified Wireless Security Professional Official Study Guide

CWSP Certified Wireless Security Professional Official Study Guide

Author: David D. Coleman

Publisher: John Wiley & Sons

Published: 2011-04-12

Total Pages: 710

ISBN-13: 0470619643

DOWNLOAD EBOOK

Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.


Wireless Security and Cryptography

Wireless Security and Cryptography

Author: Nicolas Sklavos

Publisher: CRC Press

Published: 2017-12-19

Total Pages: 526

ISBN-13: 1351838091

DOWNLOAD EBOOK

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices. Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications. Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.


CWNA Certified Wireless Network Administrator Official Study Guide

CWNA Certified Wireless Network Administrator Official Study Guide

Author: David D. Coleman

Publisher: John Wiley & Sons

Published: 2009-12-15

Total Pages: 751

ISBN-13: 0470612681

DOWNLOAD EBOOK

Sybex is now the official publisher for CWNP, the certifying vendor for the CWNA program. This valuable guide covers all objectives for the newest version of the PW0-104 exam, including radio technologies; antenna concepts; wireless LAN hardware and software; network design, installation and management; wireless standards and organizations; 802.11 network architecture; wireless LAN security; performing site surveys; and troubleshooting. Also included are hands-on exercises, chapter review questions, a detailed glossary, and a pre-assessment test. The CD-ROM features two bonus exams, over 150 flashcards, and numerous White Papers and demo software. Note: CD-ROM materials for eBook purchases can be downloaded from CWNP’s website at www.cwnp.com/sybex.


Handbook of Research on Wireless Security

Handbook of Research on Wireless Security

Author: Yan Zhang

Publisher: IGI Global

Published: 2008-01-01

Total Pages: 860

ISBN-13: 1599049007

DOWNLOAD EBOOK

Provides research on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security.


802.11 Wireless Networks: The Definitive Guide

802.11 Wireless Networks: The Definitive Guide

Author: Matthew S. Gast

Publisher: "O'Reilly Media, Inc."

Published: 2005-04-25

Total Pages: 654

ISBN-13: 1449319521

DOWNLOAD EBOOK

As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on: deployment considerations network monitoring and performance tuning wireless security issues how to use and select access points network monitoring essentials wireless card configuration security issues unique to wireless networks With wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.


Wireless Security: Models, Threats, and Solutions

Wireless Security: Models, Threats, and Solutions

Author: Randall K. Nichols

Publisher: McGraw Hill Professional

Published: 2002

Total Pages: 708

ISBN-13: 9780071380386

DOWNLOAD EBOOK

Nichols and Lekkas uncover the threats and vunerablilities unique to the wireless communication, telecom, broadband, and satellite markets. They provide an overview of current commercial security solutions available on the open market.