Wireless network security using dynamic rule generation of firewall

B. Chaudhari, P. Gothankar, A. Iyer, D. Ambawade
{"title":"Wireless network security using dynamic rule generation of firewall","authors":"B. Chaudhari, P. Gothankar, A. Iyer, D. Ambawade","doi":"10.1109/ICCICT.2012.6398174","DOIUrl":null,"url":null,"abstract":"Wireless computing has evolved tremendously and is being used almost everywhere these days. With the obvious advantage of mobility and easy installation, it also provides service comparable to its wired counterpart. Wireless LANs are implemented in colleges,offices,campuses, and are fast growing. But security in a wireless environment is paramount, and it is essential to have secure transmission and reception of information. Hackers and Crackers can easily jeopardize and break into a LAN, and can compromise the confidentiality, and integrity of information. Hence, it is essential to provide some mechanism to ensure that sharing of information in a wireless environment, as well as the basic operation of a wireless LAN is without any risk. This paper presents a methodology by which we can achieve a secure wireless environment, and ensure information and user security. This paper discusses the various attacks on wireless systems, along with the rule generation for the firewall. The results of implementation, along with an analysis of the performance of the setup has been presented in this paper.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCICT.2012.6398174","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Wireless computing has evolved tremendously and is being used almost everywhere these days. With the obvious advantage of mobility and easy installation, it also provides service comparable to its wired counterpart. Wireless LANs are implemented in colleges,offices,campuses, and are fast growing. But security in a wireless environment is paramount, and it is essential to have secure transmission and reception of information. Hackers and Crackers can easily jeopardize and break into a LAN, and can compromise the confidentiality, and integrity of information. Hence, it is essential to provide some mechanism to ensure that sharing of information in a wireless environment, as well as the basic operation of a wireless LAN is without any risk. This paper presents a methodology by which we can achieve a secure wireless environment, and ensure information and user security. This paper discusses the various attacks on wireless systems, along with the rule generation for the firewall. The results of implementation, along with an analysis of the performance of the setup has been presented in this paper.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用动态规则生成无线网络安全防火墙
无线计算已经发生了巨大的变化,现在几乎无处不在。具有明显的移动性和易于安装的优势,它还提供可与有线通信相媲美的服务。无线局域网在大学、办公室、校园中实现,并且正在迅速发展。但是无线环境中的安全是至关重要的,信息的安全传输和接收是必不可少的。黑客和破解者可以很容易地破坏和闯入局域网,并且可以损害信息的机密性和完整性。因此,必须提供某种机制来确保无线环境中的信息共享以及无线局域网的基本操作没有任何风险。本文提出了一种实现安全无线环境,保证信息和用户安全的方法。本文讨论了针对无线系统的各种攻击,以及防火墙的规则生成。本文给出了实现结果,并对该装置的性能进行了分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Compression strategy for handwritten gray level document images EKSS: An efficient approach for similarity search A semi-blind image watermarking based on Discrete Wavelet Transform and Secret Sharing Neuro Analytical hierarchy process (NAHP) approach for CAD/CAM/CIM tool selection in the context of small manufacturing industries ‘Robot-Cloud’: A framework to assist heterogeneous low cost robots
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1