PROPOSAL OF SECURITY PROTOCOLS FOR THE LOCAL WIRELESS NETWORK OF THE CIENFUEGOS UNIVERSITY

被引:0
作者
Gonzalez Paz, Alex [1 ]
Beltran Casanova, David [2 ]
Fuentes Gari, Ernesto Roberto [1 ,2 ]
机构
[1] Univ Cienfuegos, Cienfuegos, Cuba
[2] Univ Cent Marta Abreu Las Villas, Santa Clara, Cuba
来源
REVISTA UNIVERSIDAD Y SOCIEDAD | 2016年 / 8卷 / 04期
关键词
Authentication Method; Radius; safety protocols; Encryption technique; WEP; WLAN; WPA; WPA2;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
In this paper there is a characterization of the potential threats in wireless networks, the safety protocols created for the WLAN such as: WEP, 802.11i, WPA and WPA2, and protocols applied to others types of networks like the LAN networks wired which can be applied in WLAN networks. There is a comparative analysis of the safety protocols based mainly in the authentication method and the encryption technique. It concludes with the selection of the safety protocols for the WLAN of the Cienfuegos University.
引用
收藏
页码:128 / 135
页数:8
相关论文
共 50 条
[21]   Research on authentication security of wireless local area network based on L2TP protocol [J].
Niu Yan ;
Li Jun ;
Li Lala .
2009 IITA INTERNATIONAL CONFERENCE ON SERVICES SCIENCE, MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, :491-494
[22]   Optimal network design for wireless local area network [J].
Mateus, GR ;
Loureiro, AAF ;
Rodrigues, RC .
ANNALS OF OPERATIONS RESEARCH, 2001, 106 (1-4) :331-345
[23]   Optimal Network Design for Wireless Local Area Network [J].
Geraldo R. Mateus ;
Antonio A.F. Loureiro ;
Ricardo C. Rodrigues .
Annals of Operations Research, 2001, 106 :331-345
[24]   Analysis of IEEE 802.11b wireless security for university wireless LAN design [J].
Chan, FKL ;
Hoon, AH ;
Issac, B .
2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, :1137-1142
[25]   Impact of Transmission Power on the Performance of Secure Wireless Local Area Network [J].
Singh, Upendra ;
Jindal, Poonam .
2014 STUDENTS CONFERENCE ON ENGINEERING AND SYSTEMS (SCES), 2014,
[26]   Advanced Persistent Threats and Wireless Local Area Network Security: An In-Depth Exploration of Attack Surfaces and Mitigation Techniques [J].
Alamleh, Hosam ;
Estremera, Laura ;
Arnob, Shadman Sakib ;
Alqahtani, Ali Abdullah S. .
JOURNAL OF CYBERSECURITY AND PRIVACY, 2025, 5 (02)
[27]   Performance Analysis of Wireless Network Throughput and Security Protocol Integration [J].
Ochang, Paschal A. ;
Irving, Phil .
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (01) :71-78
[28]   Fast Authentication Method for Wireless Local Area Network [J].
Guo Hong-tao .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06) :53-60
[29]   Performance Analysis of Secure Wireless Local Area Network using Test-bed [J].
Singh, Upendra ;
Jindal, Poonam .
2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, :386-389
[30]   Revisiting the Modeling of User Association Patterns in a University Wireless Network [J].
Pajevic, Ljubica ;
Fodor, Viktoria ;
Karlsson, Gunnar .
2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,