首页 > 最新文献

International Journal of Security and Its Applications最新文献

英文 中文
Analyzing the performance of Various Fraud Detection Techniques 分析各种欺诈检测技术的性能
Pub Date : 2018-09-30 DOI: 10.14257/ijsia.2018.12.5.03
G. Anamika, K. Mayuri, B. K. K. Reddy, N. Iyengar, Ronnie D. Caytiles
{"title":"Analyzing the performance of Various Fraud Detection Techniques","authors":"G. Anamika, K. Mayuri, B. K. K. Reddy, N. Iyengar, Ronnie D. Caytiles","doi":"10.14257/ijsia.2018.12.5.03","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.5.03","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46343077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Issues and Attacks in Wireless Sensor Networks: Some Case Studies 无线传感器网络中的安全问题和攻击:一些案例研究
Pub Date : 2018-09-30 DOI: 10.14257/ijsia.2018.12.5.01
N. Thirupathi Rao, D. Bhattacharyya, Tai-hoon Kim
{"title":"Security Issues and Attacks in Wireless Sensor Networks: Some Case Studies","authors":"N. Thirupathi Rao, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.5.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.5.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46837069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secured Data Partitioning through Sequence based Mapping and Random Order of Data Separation 基于序列映射和随机数据分离顺序的安全数据划分
Pub Date : 2018-09-30 DOI: 10.14257/IJSIA.2018.12.5.02
Hazila Hasan, S. Chuprat, M. N. Mahrin
{"title":"Secured Data Partitioning through Sequence based Mapping and Random Order of Data Separation","authors":"Hazila Hasan, S. Chuprat, M. N. Mahrin","doi":"10.14257/IJSIA.2018.12.5.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.5.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46759601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ancillary Ultrasonic Rangefinder for Autonomous Vehicles 自动驾驶汽车辅助超声波测距仪
Pub Date : 2018-09-30 DOI: 10.14257/IJSIA.2018.12.5.05
Y. Wiseman
The latest fatal accidents of autonomous vehicle happened because of undetected peer vehicles or persons. These fatal accidents call attention to the rangefinder devices which are a very significant component of every autonomous vehicle. The rangefinder is the starting point for the decision whether the vehicle should continue to go, to stop, or bypassing an object. In this paper an ultrasonic based rangefinder device for autonomous vehicles is presented. The device can be used as an ancillary system in addition to standard LIDAR system used by almost all the autonomous vehicles, with the aim of overcoming the obstructions of conventional LIDAR systems.
最近的自动驾驶汽车致命事故是由于未被发现的同行车辆或人员造成的。这些致命事故引起了人们对测距装置的关注,测距装置是每辆自动驾驶汽车的重要组成部分。测距仪是决定车辆是否应该继续行驶、停止或绕过物体的起点。本文介绍了一种用于自动驾驶汽车的超声波测距装置。除了几乎所有自动驾驶汽车使用的标准激光雷达系统外,该设备还可以用作辅助系统,目的是克服传统激光雷达系统的障碍。
{"title":"Ancillary Ultrasonic Rangefinder for Autonomous Vehicles","authors":"Y. Wiseman","doi":"10.14257/IJSIA.2018.12.5.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.5.05","url":null,"abstract":"The latest fatal accidents of autonomous vehicle happened because of undetected peer vehicles or persons. These fatal accidents call attention to the rangefinder devices which are a very significant component of every autonomous vehicle. The rangefinder is the starting point for the decision whether the vehicle should continue to go, to stop, or bypassing an object. In this paper an ultrasonic based rangefinder device for autonomous vehicles is presented. The device can be used as an ancillary system in addition to standard LIDAR system used by almost all the autonomous vehicles, with the aim of overcoming the obstructions of conventional LIDAR systems.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49550576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks 用于跟踪认知无线电网络中用户攻击的安全优先簇间信道选择
Pub Date : 2018-09-30 DOI: 10.14257/ijsia.2018.12.5.04
Chandra Sekhar Musinana, K. Chilukuri, P. Reddy
Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.
动态频谱分配的发展是为了允许备用用户占用频谱漏洞,但当主用户返回时,备用用户必须切换,这就带来了跟踪用户攻击(Tracking User Attack, TUA)等新的安全问题。如果攻击者基于流量分析预测控制信道频率,则TUA可能会阻断认知无线网络(CRN)共享的控制信息。这是一种典型的拒绝服务(DOS)攻击,阻止用户切换到可用通道。在基于集群的信道选择中,集群头将一次接收大约两个用户的信道信息,并发送分配给基站的公共首选信道。基站选择一个信道并将其返回给集群头,集群头将它们返回给请求CR用户。在安全信道选择方面,可以通过基站对信息进行加密,在集群头部进行解密,防止DOS攻击。在这项工作中,我们提出了基于集群优先级的可用通道选择,我们称之为优先集群间通道选择(PICCS)。优先级本质上是根据集群中的攻击者计算出的基于历史的集群声誉。因此,在集群间通道选择期间,我们从最佳可用集群中选择一个通道,而不是随机选择可用通道的集群。我们观察了这种选择在攻击者存在时对延迟和切换的影响,并将其与基于最近可用集群的信道选择方案进行了比较。
{"title":"Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks","authors":"Chandra Sekhar Musinana, K. Chilukuri, P. Reddy","doi":"10.14257/ijsia.2018.12.5.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.04","url":null,"abstract":"Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46251164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Assurance Aspects to be Observed in Cloud Computing Based Data Centers: A Study 基于云计算的数据中心应注意的安全和保证方面:一项研究
Pub Date : 2018-07-31 DOI: 10.14257/ijsia.2018.12.4.01
N. Thirupathi Rao, A. Sravani, D. Bhattacharyya, Tai-hoon Kim
{"title":"Security and Assurance Aspects to be Observed in Cloud Computing Based Data Centers: A Study","authors":"N. Thirupathi Rao, A. Sravani, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.4.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.4.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.4.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49353899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention 网络安全攻击检测、预测和预防方法综述
Pub Date : 2018-07-31 DOI: 10.14257/IJSIA.2018.12.4.02
Ayei E. Ibor, F. Oladeji, O. Okunoye
The expanding threat landscape has come with a plethora of consequences for most organizations and individuals. This is witnessed in the high volume of cyber-attacks prevalent in the cyberspace. Though several approaches have been proposed and deployed in recent times, most of them are only theoretical masterpieces while others remain computationally infeasible due to the computational requirements for implementing them. Where implementation is possible, the issue of computational complexity becomes a significant overhead in which case a large amount of computing resources such as CPU cycle, memory, network bandwidth and data structures are consumed culminating in tedious, time consuming, and error prone processes. Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes after an attack has occurred. To this effect, this paper presents a survey of cyber security approaches that have been proposed in the Literature. The paper also reviews the methodologies, strengths and weaknesses of these approaches, and finally identifies areas where further research could focus.
不断扩大的威胁形势给大多数组织和个人带来了过多的后果。网络空间中大量的网络攻击就是明证。虽然近年来已经提出和部署了几种方法,但大多数方法只是理论上的杰作,而其他方法由于实现它们的计算要求而在计算上不可行的。在可能实现的情况下,计算复杂性的问题成为一个重要的开销,在这种情况下,大量的计算资源(如CPU周期、内存、网络带宽和数据结构)被消耗,最终导致冗长、耗时和容易出错的过程。类似地,这些技术中的大多数基本上都是被动的,因此只能在报告事件时触发,而大多数技术依赖于管理员在攻击发生后应用必要的缓解流程。为此,本文提出了文献中提出的网络安全方法的调查。本文还回顾了这些方法的方法、优缺点,并最终确定了进一步研究的重点领域。
{"title":"A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention","authors":"Ayei E. Ibor, F. Oladeji, O. Okunoye","doi":"10.14257/IJSIA.2018.12.4.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.4.02","url":null,"abstract":"The expanding threat landscape has come with a plethora of consequences for most organizations and individuals. This is witnessed in the high volume of cyber-attacks prevalent in the cyberspace. Though several approaches have been proposed and deployed in recent times, most of them are only theoretical masterpieces while others remain computationally infeasible due to the computational requirements for implementing them. Where implementation is possible, the issue of computational complexity becomes a significant overhead in which case a large amount of computing resources such as CPU cycle, memory, network bandwidth and data structures are consumed culminating in tedious, time consuming, and error prone processes. Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes after an attack has occurred. To this effect, this paper presents a survey of cyber security approaches that have been proposed in the Literature. The paper also reviews the methodologies, strengths and weaknesses of these approaches, and finally identifies areas where further research could focus.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67048212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A New Fault-Tolerant Clustering Protocol for Wireless Sensor Networks 一种新的无线传感器网络容错聚类协议
Pub Date : 2018-07-31 DOI: 10.14257/IJSIA.2018.12.4.03
Mehdi Nazari Cheraghlou, A. K. Zadeh, M. Haghparast
The major restriction of wireless sensor networks is represented by the energy requirements of the nodes. Also, the main challenge of these networks is their faulttolerance feature since the nodes are scattered in remote, inaccessible areas. Therefore, these issues must be the main concern of the management of the network nodes and all the proposed protocols must be evaluated based on a fault-tolerance capacity and handling basic network restrictions. In this article, we introduce a new fault-tolerant clustering network consisting of two sections: in the first phase, the clustering configuration takes place, and in the second phase, we create a fault-tolerant management architecture that employs fault detection and recovery mechanisms. In the proposed protocol, besides improving the network faulttolerance capacity, the impossibility of recharging nodes was a design factor. Thus, energy conservation and an increased network lifetime are two consequences related to the implementation of our proposed algorithm. The evaluations and comparisons prove that the proposed model in addition to increasing the network nodes' fault-tolerance capacity reduces the overall network energy consumption and lays the foundation for extending the network lifetime.
无线传感器网络的主要限制是节点的能量需求。此外,这些网络的主要挑战是其容错特性,因为节点分散在偏远、无法访问的区域。因此,这些问题必须是网络节点管理的主要问题,并且必须基于容错能力和处理基本网络限制来评估所有提出的协议。在本文中,我们介绍了一种新的容错集群网络,该网络由两部分组成:在第一阶段,进行集群配置,在第二阶段,我们创建了一个采用故障检测和恢复机制的容错管理架构。在所提出的协议中,除了提高网络容错能力外,节点不可能充电也是一个设计因素。因此,节能和增加网络寿命是与我们提出的算法的实现相关的两个结果。评估和比较表明,该模型除了提高网络节点的容错能力外,还降低了网络的整体能耗,为延长网络寿命奠定了基础。
{"title":"A New Fault-Tolerant Clustering Protocol for Wireless Sensor Networks","authors":"Mehdi Nazari Cheraghlou, A. K. Zadeh, M. Haghparast","doi":"10.14257/IJSIA.2018.12.4.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.4.03","url":null,"abstract":"The major restriction of wireless sensor networks is represented by the energy requirements of the nodes. Also, the main challenge of these networks is their faulttolerance feature since the nodes are scattered in remote, inaccessible areas. Therefore, these issues must be the main concern of the management of the network nodes and all the proposed protocols must be evaluated based on a fault-tolerance capacity and handling basic network restrictions. In this article, we introduce a new fault-tolerant clustering network consisting of two sections: in the first phase, the clustering configuration takes place, and in the second phase, we create a fault-tolerant management architecture that employs fault detection and recovery mechanisms. In the proposed protocol, besides improving the network faulttolerance capacity, the impossibility of recharging nodes was a design factor. Thus, energy conservation and an increased network lifetime are two consequences related to the implementation of our proposed algorithm. The evaluations and comparisons prove that the proposed model in addition to increasing the network nodes' fault-tolerance capacity reduces the overall network energy consumption and lays the foundation for extending the network lifetime.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.4.03","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47467602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
KAMIES: Security Optimization of KASUMI Algorithm by Increasing Diffusion Level KAMIES:KASUMI算法的安全优化
Pub Date : 2018-05-31 DOI: 10.14257/IJSIA.2018.12.3.04
Muhammad Salman, Rizki Yugitama, Amiruddin, R. F. Sari
{"title":"KAMIES: Security Optimization of KASUMI Algorithm by Increasing Diffusion Level","authors":"Muhammad Salman, Rizki Yugitama, Amiruddin, R. F. Sari","doi":"10.14257/IJSIA.2018.12.3.04","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49176052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Practical Guidelines for Securing Wireless Local Area Networks (WLANs) 确保无线局域网(WLAN)安全的实用指南
Pub Date : 2018-05-31 DOI: 10.14257/IJSIA.2018.12.3.03
Ahmed Khan, Aaliya Sarfaraz
The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.
该出版物一般侧重于各种组织广泛使用的无线局域网(wlan)的安全配置和监控。无线局域网(wlan)对使用无线局域网[1]的不同组织提出了一个特殊的挑战。多年来,针对无线局域网的攻击比例一直在增加,这迫使WLAN的组织和用户重新考虑其WLAN的安全性。该出版物通过提出相关建议,为改进无线局域网(wlan)和连接到这些网络的设备的安全和监测标准提供了一条前进的道路。本文对所有与规划、实施、维护和监控特定组织的无线局域网的安全性以及连接到这些WLAN的所有设备相关的人员(如网络专业人员、安全专业人员、系统管理员以及与组织网络安全相关的所有其他实体)非常有帮助。该出版物的范围限于非机密的无线网络以及属于此类无线网络范围内的非机密设施。
{"title":"Practical Guidelines for Securing Wireless Local Area Networks (WLANs)","authors":"Ahmed Khan, Aaliya Sarfaraz","doi":"10.14257/IJSIA.2018.12.3.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.03","url":null,"abstract":"The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41751992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
International Journal of Security and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1