SlideShare una empresa de Scribd logo
1 de 16
Research on Security of the WLAN Campus Network karthik.k 1 st  sem, M.Tech, CNE
OUTLINE   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
WLAN Benefits  ,[object Object],[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
WLAN Standards ,[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
The Three Feathers of WLAN ,[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
Security Threats ,[object Object],[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
Existing Security Technologies ,[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
New Security Control Program Proposed ,[object Object],[object Object],[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
Access Control ,[object Object],[object Object],Dept of CSE, DSCE  2010
Content Filtering ,[object Object],[object Object],Dept of CSE, DSCE  2010
Data Encryption ,[object Object],[object Object],Dept of CSE, DSCE  2010
User Management ,[object Object],[object Object],Dept of CSE, DSCE  2010
Log Audit ,[object Object],[object Object],Dept of CSE, DSCE  2010
Conclusion ,[object Object],[object Object],Dept of CSE, DSCE  2010
References ,[object Object],[object Object],[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
Thank You Dept of CSE, DSCE  2010

Más contenido relacionado

La actualidad más candente

Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
IJCSIS Research Publications
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in CloudSecure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Umer Khalid
 
Poster for Snickers Conference(Afghah Version)
Poster for Snickers Conference(Afghah Version)Poster for Snickers Conference(Afghah Version)
Poster for Snickers Conference(Afghah Version)
Jabari Stegall
 

La actualidad más candente (20)

A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...
 
Secure final
Secure finalSecure final
Secure final
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and Comparisons
 
Refercences
RefercencesRefercences
Refercences
 
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in CloudSecure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
 
LAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative TechnologyLAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative Technology
 
Ijnsa050204
Ijnsa050204Ijnsa050204
Ijnsa050204
 
Networking Research Projects Help
Networking Research Projects Help Networking Research Projects Help
Networking Research Projects Help
 
Campus Area Network Security
Campus Area Network SecurityCampus Area Network Security
Campus Area Network Security
 
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
 
Poster for Snickers Conference(Afghah Version)
Poster for Snickers Conference(Afghah Version)Poster for Snickers Conference(Afghah Version)
Poster for Snickers Conference(Afghah Version)
 
Resume
ResumeResume
Resume
 
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 

Destacado

Install a new windows server 2008 r2 forest
Install a new windows server 2008 r2 forestInstall a new windows server 2008 r2 forest
Install a new windows server 2008 r2 forest
Raghu nath
 
Severe acute respiratory syndrome
Severe acute respiratory syndromeSevere acute respiratory syndrome
Severe acute respiratory syndrome
Aini Alwee
 
Sars Presentation
Sars PresentationSars Presentation
Sars Presentation
cglace
 
Epidemic of Epidemics
Epidemic of EpidemicsEpidemic of Epidemics
Epidemic of Epidemics
Elise Paradis
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
Alexander Schek
 

Destacado (20)

Iuwne10 S04 L06
Iuwne10 S04 L06Iuwne10 S04 L06
Iuwne10 S04 L06
 
Install a new windows server 2008 r2 forest
Install a new windows server 2008 r2 forestInstall a new windows server 2008 r2 forest
Install a new windows server 2008 r2 forest
 
Iuwne10 S04 L03
Iuwne10 S04 L03Iuwne10 S04 L03
Iuwne10 S04 L03
 
Step by step procedure to set up a
Step by step procedure to set up aStep by step procedure to set up a
Step by step procedure to set up a
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
SARS
SARSSARS
SARS
 
Wlan security
Wlan securityWlan security
Wlan security
 
Severe Acute Respiratory Syndrome (SARS) : Treatment and prophylaxis with Re...
Severe Acute Respiratory Syndrome (SARS)  : Treatment and prophylaxis with Re...Severe Acute Respiratory Syndrome (SARS)  : Treatment and prophylaxis with Re...
Severe Acute Respiratory Syndrome (SARS) : Treatment and prophylaxis with Re...
 
Severe Acute Respiratory Syndrome
Severe Acute Respiratory SyndromeSevere Acute Respiratory Syndrome
Severe Acute Respiratory Syndrome
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Severe acute respiratory syndrome
Severe acute respiratory syndromeSevere acute respiratory syndrome
Severe acute respiratory syndrome
 
SARS
SARSSARS
SARS
 
Sars Presentation
Sars PresentationSars Presentation
Sars Presentation
 
Wlan security
Wlan securityWlan security
Wlan security
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Epidemic of Epidemics
Epidemic of EpidemicsEpidemic of Epidemics
Epidemic of Epidemics
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
 
Message Authentication: MAC, Hashes
Message Authentication: MAC, HashesMessage Authentication: MAC, Hashes
Message Authentication: MAC, Hashes
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
 

Similar a Research on security of the wlan campus network

Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
CSCJournals
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
IJCSIS Research Publications
 
A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 
2012engg
 
A framework for wireless lan monitoring and its applications
A framework for wireless lan monitoring and its applicationsA framework for wireless lan monitoring and its applications
A framework for wireless lan monitoring and its applications
2012engg
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Lindsey Landolfi
 

Similar a Research on security of the wlan campus network (20)

Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
lecture_5.pptx
lecture_5.pptxlecture_5.pptx
lecture_5.pptx
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
802.11ac
802.11ac802.11ac
802.11ac
 
Meru Presentation
Meru PresentationMeru Presentation
Meru Presentation
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 
 
A framework for wireless lan monitoring and its applications
A framework for wireless lan monitoring and its applicationsA framework for wireless lan monitoring and its applications
A framework for wireless lan monitoring and its applications
 
Wi-Fi & Smart E-learning Experience at SOA University
Wi-Fi & Smart E-learning Experience at SOA UniversityWi-Fi & Smart E-learning Experience at SOA University
Wi-Fi & Smart E-learning Experience at SOA University
 
J010216776
J010216776J010216776
J010216776
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
Communication standard
Communication standardCommunication standard
Communication standard
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Experimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc networkExperimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc network
 
Pdf3
Pdf3Pdf3
Pdf3
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Research on security of the wlan campus network