PROPOSAL OF SECURITY PROTOCOLS FOR THE LOCAL WIRELESS NETWORK OF THE CIENFUEGOS UNIVERSITY

被引:0
作者
Gonzalez Paz, Alex [1 ]
Beltran Casanova, David [2 ]
Fuentes Gari, Ernesto Roberto [1 ,2 ]
机构
[1] Univ Cienfuegos, Cienfuegos, Cuba
[2] Univ Cent Marta Abreu Las Villas, Santa Clara, Cuba
来源
REVISTA UNIVERSIDAD Y SOCIEDAD | 2016年 / 8卷 / 04期
关键词
Authentication Method; Radius; safety protocols; Encryption technique; WEP; WLAN; WPA; WPA2;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
In this paper there is a characterization of the potential threats in wireless networks, the safety protocols created for the WLAN such as: WEP, 802.11i, WPA and WPA2, and protocols applied to others types of networks like the LAN networks wired which can be applied in WLAN networks. There is a comparative analysis of the safety protocols based mainly in the authentication method and the encryption technique. It concludes with the selection of the safety protocols for the WLAN of the Cienfuegos University.
引用
收藏
页码:128 / 135
页数:8
相关论文
共 50 条
  • [21] Research on authentication security of wireless local area network based on L2TP protocol
    Niu Yan
    Li Jun
    Li Lala
    2009 IITA INTERNATIONAL CONFERENCE ON SERVICES SCIENCE, MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 491 - 494
  • [22] Optimal network design for wireless local area network
    Mateus, GR
    Loureiro, AAF
    Rodrigues, RC
    ANNALS OF OPERATIONS RESEARCH, 2001, 106 (1-4) : 331 - 345
  • [23] Optimal Network Design for Wireless Local Area Network
    Geraldo R. Mateus
    Antonio A.F. Loureiro
    Ricardo C. Rodrigues
    Annals of Operations Research, 2001, 106 : 331 - 345
  • [24] Analysis of IEEE 802.11b wireless security for university wireless LAN design
    Chan, FKL
    Hoon, AH
    Issac, B
    2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 1137 - 1142
  • [25] Impact of Transmission Power on the Performance of Secure Wireless Local Area Network
    Singh, Upendra
    Jindal, Poonam
    2014 STUDENTS CONFERENCE ON ENGINEERING AND SYSTEMS (SCES), 2014,
  • [26] Performance Analysis of Wireless Network Throughput and Security Protocol Integration
    Ochang, Paschal A.
    Irving, Phil
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (01): : 71 - 78
  • [27] Fast Authentication Method for Wireless Local Area Network
    Guo Hong-tao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 53 - 60
  • [28] Performance Analysis of Secure Wireless Local Area Network using Test-bed
    Singh, Upendra
    Jindal, Poonam
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 386 - 389
  • [29] Revisiting the Modeling of User Association Patterns in a University Wireless Network
    Pajevic, Ljubica
    Fodor, Viktoria
    Karlsson, Gunnar
    2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
  • [30] Improved Support Vector Machine Wireless Network Security Detection Algorithm Model
    Lv, Xiujian
    Sun, ZhiCheng
    Wang, Jing
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC & MECHANICAL ENGINEERING AND INFORMATION TECHNOLOGY (EMEIT-2012), 2012, 23