Wireless Network Security
14,494 Followers
Recent papers in Wireless Network Security
SNOW 3G is a synchronous, word-oriented stream cipher used by the 3GPP standards as a confidentiality and integrity algorithms. It is used as first set in long term evolution (LTE) and as a second set in universal mobile... more
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
In this research a survey is conducted that looks into the architecture of VANETs and their areas of application. The architecture is broadly discussed in the introductory part, which also outlines the key role players. The paper also... more
As in today's date fuel consumption is important in everything from scooters to oil tankers, power consumption is a key parameter in most electronics applications. The most obvious applications for which power consumption is critical are... more
Today’s wireless networks are vulnerable in many ways (eavesdropping, illegal use, unauthorized access, denial of service attacks, so called warchalking etc). These problems and concerns are one of main obstacles for wider usage of... more
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes... more
— Any algorithm is evaluated based on its confusion and diffusion property determining its strength to withstand the intruding attacks. AES (Advanced Encryption Standard), using 128-bit key size has the number of rounds processed over... more
Wireless (Wi-Fi) networks based on IEEE 802.11 1 family of standards have been spreading its coverage last years and this trend is expected to grow. Every day more and more people use this type of networks to access Internet, company or... more
Since the liberalization of the telecommunication sector in Uganda in 1998, the key services have been voice, data and low rate Internet. The backbone link to the rest of the world has been via satellite which is characterized by low... more
In Network Security and Cryptography, hash functions play a very important role. To check the Integrity, Authenticity of information or data transmitting between the Seder and receiver party hash algorithms are used. Digital signature... more
With rapid progress in the field of radio technology, Wireless networks have grown to have many beneficial features, the main one is MOBILITY. The downside of these networks is susceptibility to attacks, which has persisted since the very... more
This paper presents a brief overview of the different cryptographic methods used in mobile networks. The focus here is on the mobile communication standards-1G to 4G. The purpose of this paper is to appreciate the evolution of security... more
Wireless sensor networks (WSNs) have attracted a lot of interest over the last decade in wireless and mobile computing research community. Applications of WSNs are numerous and growing, which range from indoor deployment scenarios in the... more
Modbus is the de facto standard communication protocol for the industrial world. It was initially designed to be used in serial communications (Modbus RTU/ASCII). However, not long ago, it was adapted to TCP due to the increasing... more
International Journal of Microwave Engineering (JMICRO) is a peer-reviewed, open access journal which invites high quality manuscripts that focuses on Engineering and theory associated with microwave / millimeter-wave technology, guided... more
How to reflash older Ubiquity hardware with latest firmware, this removes the ubnt virus and restores the radio to factory default settings.
International Journal of Computer Networks & Communications (IJCNC) (Scopus, ERA Listed) ISSN 0974 - 9322 (Online); 0975 - 2293 (Print) http://airccse.org/journal/ijcnc.html New Issue: January 2020, Volume 12, Number 1 --- Table... more
Physical Unclonable Functions (PUFs) are promising security primitives for resource-constrained network nodes. The XOR Arbiter PUF (XOR PUF or XPUF) is an intensively studied PUF invented to improve the security of the Arbiter PUF,... more
In this contemporary world, network computing has become one of the major requirements in today’s world. It can be seen in various places such as in home, universities, hospitals, airports, hotels, retail shops, banks, government sectors,... more
Security Assessment Pada Jaringan Private Wireless LAN
International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more
Wireless communications, nowadays, becomes a vital element of people's daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities,... more
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on... more
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more
In an enterprise network, it is normal to use multiple dynamic routing protocols for forwarding packets. Therefore, the route redistribution is an important issue in an enterprise network that has been configured by multiple different... more
The paper presents a Riverbed simulator implementation with both routing and medium access control (MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs). As one of the latest promising antenna... more
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its... more
Wireless technology provides us many benefits like portability and flexibility, increased productivity, and lower installation costs. Wi-Fi networks can be accessed with laptops, mobile phones, cameras, game consoles, and an increasing... more
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal... more
In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight approximate moment generating function... more
Wireless communication is the most effective communication to convey audio or video information among the population. It enables the masses to connect throughout the world. Wireless technologies improve the lifestyle of individuals in... more