{"title":"Security and Countermeasures Wireless Communication Algorithm with Penetration Testing","authors":"Shahan Yamin Siddiqui","doi":"10.54692/lgurjcsit.2020.0402132","DOIUrl":null,"url":null,"abstract":"The communication algorithm security, in general, is a pending issue that has only recently become aware. In wireless communication algorithms, this need is more obvious, by its characteristics, and is part of the design of Wi-Fi communication algorithms. The biggest security problem of Wi-Fi communication algorithms is given by its spatial dispersion. It is not limited to an area, a cable or optical fiber, or has specific access points or connection, but it expands and is accessible from any point within its coverage. This makes it very vulnerable to wireless communication algorithms because of the physical security of this communication algorithm is difficult to secure.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Lahore Garrison University Research Journal of Computer Science and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54692/lgurjcsit.2020.0402132","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The communication algorithm security, in general, is a pending issue that has only recently become aware. In wireless communication algorithms, this need is more obvious, by its characteristics, and is part of the design of Wi-Fi communication algorithms. The biggest security problem of Wi-Fi communication algorithms is given by its spatial dispersion. It is not limited to an area, a cable or optical fiber, or has specific access points or connection, but it expands and is accessible from any point within its coverage. This makes it very vulnerable to wireless communication algorithms because of the physical security of this communication algorithm is difficult to secure.