Review on Security Threats of Wireless Networks
Journal: International Journal of Computational and Electronic Aspects in Engineering (Vol.1, No. 2)Publication Date: 2015-03-30
Authors : Leena L. Nikhare; Neha M. Nandagawali;
Page : 19-22
Keywords : Wireless Network; AODV; NS2; Security; Trace File format Routing Protocol.;
Abstract
Wireless networks are gaining popularity to get its highest and strongest level today, as the users want connectivity in terms of wireless medium irrespective of their geographic position. On the Wireless Network, there is an increasing threats, viruses and various attacks. The main goal of this paper, is to provide a survey of the wireless network and attacks that occur on the wireless network. The Design of wireless Network uses NS2, which is based on Security evaluation, and it also describes the proposed model of the system as well as complete description of the Simulations and software program needed for implementing the Wireless Network. NS2 is a very widely used tool of networks. This paper also provides an overview of routing protocols being used in wireless networks. Ad-hoc network must have a secure way for transmission and communication which is quite challenging and phrasing most issues regarding to the wireless networks. Ad-hoc network are rapidly gaining popularity because they do not depends on a pre-infrastructure and can be deployed quickly. Ad-hoc network is used from offices to modern battlefields this is the application of it. It has open secure functionality hence it uses most on private places and also for mobile communication purposes.
Other Latest Articles
- 3D Password for More Secure Authentication For Smart Phone
- Boltzmann Machine and Hyperbolic activation function in Higher Order Neuro Symbolic Integration
- Statistical Neural Networks in the Classification of Alcoholic Liver Disease and Nonalcoholic Fatty Liver Disease
- Design and Development of Coin Based Mobile Charger using Solar Energy
- FPGA Implementation of LMS Algorithm Used in Adaptive Equalizer
Last modified: 2016-02-29 14:13:07