ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Analyzing Vulnerabilities on WLAN Security Protocols and Enhance its Security by using Pseudo Random MAC Address

Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.6, No. 3)

Publication Date:

Authors : ; ;

Page : 293-300

Keywords : Key Words : AP; MAC; PRMACGA; WLAN; WEP; WPA/WPA2.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Abstract Now a day's Wireless local area network (WLAN) is more popular due to It's various advantages such as high data rate, flexible, low cost, effectiveness, mobility and easy to access by any one. Even though it is popular, there are more vulnerabilities exist. Because it is using unguided medium for communication. However there are security protocols, they are not assuring 100 % security. In this paper Using Kali Linus we have done some penetration tests on WLAN security protocols and MAC Filtering. Finally we proposed a security Algorithm to enhance the security of MAC Filtering mechanism.

Last modified: 2017-07-15 23:53:31