PROPOSAL OF SECURITY PROTOCOLS FOR THE LOCAL WIRELESS NETWORK OF THE CIENFUEGOS UNIVERSITY

被引:0
作者
Gonzalez Paz, Alex [1 ]
Beltran Casanova, David [2 ]
Fuentes Gari, Ernesto Roberto [1 ,2 ]
机构
[1] Univ Cienfuegos, Cienfuegos, Cuba
[2] Univ Cent Marta Abreu Las Villas, Santa Clara, Cuba
来源
REVISTA UNIVERSIDAD Y SOCIEDAD | 2016年 / 8卷 / 04期
关键词
Authentication Method; Radius; safety protocols; Encryption technique; WEP; WLAN; WPA; WPA2;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
In this paper there is a characterization of the potential threats in wireless networks, the safety protocols created for the WLAN such as: WEP, 802.11i, WPA and WPA2, and protocols applied to others types of networks like the LAN networks wired which can be applied in WLAN networks. There is a comparative analysis of the safety protocols based mainly in the authentication method and the encryption technique. It concludes with the selection of the safety protocols for the WLAN of the Cienfuegos University.
引用
收藏
页码:128 / 135
页数:8
相关论文
共 50 条
[31]   Improved Support Vector Machine Wireless Network Security Detection Algorithm Model [J].
Lv, Xiujian ;
Sun, ZhiCheng ;
Wang, Jing .
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC & MECHANICAL ENGINEERING AND INFORMATION TECHNOLOGY (EMEIT-2012), 2012, 23
[32]   Wireless Local Area Network Adaptive Modulation and Coding Technology Research [J].
SUN ZengyouSUN XiaofanNortheast Dianli UniversitySchool of Information EngineeringJilin China .
电脑知识与技术, 2012, 8 (28) :6679-6683
[33]   Indoor Localization System Benchmark Based on Wireless Local Network Technologies [J].
Lyazdi, Safae ;
El Khadimi, Ahmed ;
Zaz, Youssef .
2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, :942-948
[34]   Compact Microstrip Filtenna Designed For Wireless Local Area Network Applications [J].
El Ouadi, Zakaria ;
Amadid, Jamal ;
Khabba, Asma ;
El Yassini, Abdessalam ;
Ibnyaich, Saida ;
Zeroual, Abdelouhab .
2022 INTERNATIONAL CONFERENCE ON DECISION AID SCIENCES AND APPLICATIONS (DASA), 2022, :1593-1597
[35]   Implementation of location determination in a wireless local area network (WLAN) environment [J].
Bin Ismail, Mahamod ;
Boud, Aly Fathi Aly ;
Ibrahim, Wan Nurdiana Wan .
10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, :894-899
[36]   Modeling and evaluation of security architecture for wireless local area networks by indexing method: A novel approach [J].
Nayak, D ;
Phatak, DB ;
Gulati, VP .
INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 :25-35
[37]   Collision Avoidance and Mitigation in Cognitive Wireless Local Area Network over Fibre [J].
Li, Haoming ;
Attar, Alizera ;
Leung, Victor C. M. ;
Pang, Qixiang .
2009 FIRST INTERNATIONAL CONFERENCE ON EVOLVING INTERNET (INTERNET 2009), 2009, :133-+
[38]   Performance Evolution of IEEE 802.11b Wireless Local Area Network [J].
Malik, Deepak ;
Singhal, Ankur .
2ND INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-11), 2011, 1414
[39]   An Efficient Priority-based Polling Scheme for Wireless Local Area Network [J].
Yang, Zhijun ;
Zhang, Weifeng ;
Ding, Hongwei ;
Guan, Zheng .
PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, :305-309
[40]   A secure M-commerce model based on wireless local area network [J].
Li, XH ;
Kou, WD .
18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, :520-523