{"title":"Wireless network security using dynamic rule generation of firewall","authors":"B. Chaudhari, P. Gothankar, A. Iyer, D. Ambawade","doi":"10.1109/ICCICT.2012.6398174","DOIUrl":null,"url":null,"abstract":"Wireless computing has evolved tremendously and is being used almost everywhere these days. With the obvious advantage of mobility and easy installation, it also provides service comparable to its wired counterpart. Wireless LANs are implemented in colleges,offices,campuses, and are fast growing. But security in a wireless environment is paramount, and it is essential to have secure transmission and reception of information. Hackers and Crackers can easily jeopardize and break into a LAN, and can compromise the confidentiality, and integrity of information. Hence, it is essential to provide some mechanism to ensure that sharing of information in a wireless environment, as well as the basic operation of a wireless LAN is without any risk. This paper presents a methodology by which we can achieve a secure wireless environment, and ensure information and user security. This paper discusses the various attacks on wireless systems, along with the rule generation for the firewall. The results of implementation, along with an analysis of the performance of the setup has been presented in this paper.","PeriodicalId":319467,"journal":{"name":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Communication, Information & Computing Technology (ICCICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCICT.2012.6398174","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Wireless computing has evolved tremendously and is being used almost everywhere these days. With the obvious advantage of mobility and easy installation, it also provides service comparable to its wired counterpart. Wireless LANs are implemented in colleges,offices,campuses, and are fast growing. But security in a wireless environment is paramount, and it is essential to have secure transmission and reception of information. Hackers and Crackers can easily jeopardize and break into a LAN, and can compromise the confidentiality, and integrity of information. Hence, it is essential to provide some mechanism to ensure that sharing of information in a wireless environment, as well as the basic operation of a wireless LAN is without any risk. This paper presents a methodology by which we can achieve a secure wireless environment, and ensure information and user security. This paper discusses the various attacks on wireless systems, along with the rule generation for the firewall. The results of implementation, along with an analysis of the performance of the setup has been presented in this paper.