SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Research Inventy: International Journal Of Engineering And Science
Vol.3, Issue 7 (August 2013), PP 01-05
Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com
1
Securing Wi-Fi Network Via Proxy Servers
Surbhi Gupta1
, Puneet Bhalla1
1.
Department of Computer Science , Dronacharaya college of engg., Gurgaon
ABSTRACT : “Unsecured wi-fi network (genetically known as Wireless Local Area Network or WLAN) has
become a national celebrity in vamp category due to it’s misuse by terrorists, in the recent past.Even otherwise,
any open and unsecured node, especially wireless,is an extremely serious security hazard for any network,
whether it is corporate, personal, home or small office user. Wi-fi networks are in the news in the recent past
due to effective misuse of these by terror organisations. They have been misused asthese wireless (wi-fi)
networks have been installed unsecured. Withthe misuse by terrorists, unsecured wi-fi misuse has become
national celebrity in villain and vamp categories.”
KEYWORDS: AES, DAIR, MAC, Proxy server, TKIP, WEP, WPA
I. INTRODUCTION
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide
wireless high-speed Internet and network connections. The Wi-Fi Alliance, the organization that owns the Wi-Fi
(registered trademark) term specifically definesWi-Fi as any "wireless local area network (WLAN) products
that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards."Initially, Wi-Fi
was used in place of the 2.4 GHz 802.11b standardonly, however the Wi-Fi Al liance has expanded the generic
use of the Wi-Fi term to include any type of network or WLAN product based on any of the 802.11 standards,
including 802.11b,802.11a, dual-band, and so on, in an attempt tostop confusionabout wireless LAN
interoperability.Wi-Fi works with no physical wiredconnection between sender andreceiver by using radio
frequency (RF) technology, afrequency within the electromagnetic spectrum associated with radio
wavepropagation. When an RF current is supplied to an antenna, an electromagnetic field is created that then is
able to propagate through air or space. The cornerstone of any wireless network is an access point (AP). The
primary job of an access point is to broadcast a wireless signal that computers can detect and "tune" into. In
order to connect to an access point and join a wireless network, computers and devices must be equipped with
wirelessnetwork adapters.Wi-Fi is supported by many appl ications and devices including video game consoles,
home networks, PDAs, mobile phones, major operating systems, and other types of consumer electronics.
Anyproducts that are tested and approved as "Wi-Fi Certified" (aregistered trademark) by the Wi-Fi Alliance are
certified asinteroperable with each other, even if they are from differentmanufacturers. For example, a user with
a Wi-Fi Certified productcan use any brand of access point with any other brand of clienthardware that also is
also "Wi-Fi Certified". Products that pass thiscertification are required to carry an identifying seal on
theirpackaging that states "Wi-Fi Certified" and indicates the radiofrequency band used (2.4 GHz for 802.11b,
802.11g, or 802.11n,and 5GHz for 802.11a).[1]
1.1.How to secure wi-fi and protect ourselves –
The question arises – what a person must do to take care that the wireless network (wi-fi) is not
misused by any anti-social, antinational or criminal element or anyone else, may be insider, who is not
authorised to access / use the network. The question is: how to secure your wireless network or wi-fi network
connection or access point (AP) .There are three important aspects of wireless (or any) security –
A. Wireless network must be technically reasonably secured.
B. User must be educated in security.
C. Security must be monitored for weaknesses and breaches.
1.2.Checklist to protect your wireless (wi-fi) network
1.2.1.Mandatory Controls –
1. Change Default Administrator Passwords and Usernames
2. Turn on (Compatible) WPA / WEP Encryption
3. Enable Firewalls On Each Computer and the Router
4. Disable Auto-connect feature
5. Position the Router or Access Point (AP) Safely
Securing Wi-fi Network Via...
2
6. Turn Off the power switch of Router/AP, when not in use
7. Assign Static IP Addresses to Devices
1.2.2.Desirable Controls -
8. Change the Default SSID
9. Disable SSID Broadcast
10. Enable MAC Address Filtering
II. SCOPE OF STUDY
Proxy server is a server (a computer system or an application) that acts as an intermediary for requests
from clients seeking resources from other servers. A client connects to the proxy server, requesting some
service, such as a file, connection, web page, or other resource available from a different server and the proxy
server evaluates the request as a way to simplify and control its complexity.[2]
A proxy server may run right on
the user's local computer, or at various points between the user's computer and destination servers on the
Internet.
 A proxy server that passes requests and responses unmodified is usually called a gateway or sometimes
a tunneling proxy.
 A forward proxy is an Internet-facing proxy used to retrieve from a wide range of sources (in most cases
anywhere on the Internet).
 A reverse proxy is usually an Internet-facing proxy used as a front-end to control and protect access to a
server on a private network, commonly also performing tasks such as load-balancing, authentication,
decryption or caching.[3]
2.1.Forward proxies
A forward proxy taking requests from an internal network and forwarding them to Internet.
Forward proxies are proxies where the client server names the target server to connect to.[3]
Forward
proxies are able to retrieve from a wide range of sources (in most cases anywhere on the Internet).The terms
"forward proxy" and "forwarding proxy" are a general description of behavior (forwarding traffic) and thus
ambiguous. Except for Reverse proxy, the types of proxies described in this article are more specialized sub-
types of the general forward proxy concept.
2.2.Open proxies
An open proxy forwarding requests from and to anywhere on the Internet.
An open proxy is a forwarding proxy server that is accessible by any Internet user. Gordon
Lyon estimates there are "hundreds of thousands" of open proxies on the Internet.[4]
Ananonymous open
proxy allows users to conceal their IP address while browsing the Web or using other Internet services. There
are varying degrees of anonymity however, as well as a number of methods of 'tricking' the client into revealing
itself regardless of the proxy being used.
Securing Wi-fi Network Via...
3
2.3.Reverse proxies
A reverse proxy taking requests from the Internet and forwarding them to servers in an internal network.Those
making requests connect to the proxy and may not be aware of the internal network.
A reverse proxy (or surrogate) is a proxy server that appears to clients to be an ordinary server. Requests are
forwarded to one or more origin servers which handle the request. The response is returned as if it came directly
from the web server.[3]
Reverse proxies are installed in the neighborhood of one or more web servers. All traffic
coming from the Internet and with a destination of one of the neighborhood's web servers goes through the
proxy server. The use of "reverse" originates in its counterpart "forward proxy" since the reverse proxy sits
closer to the web server and serves only a restricted set of websites.
III. RELATED WORK
3.1.A very rudimentary test to verify your wireless network iscompletely unsecured –
In the MS Windows environment, drag your mouse over the wireless icon in the bottom right corner
(this corner is called the “system tray”) of your computer screen. This wil l display the name of your wireless
network. If it shows the default name of the wireless network, as provided by the manufacturer, you have high
probability of having an unsecured network. In unsecured network, this may be the make or model of your
wireless router and you may seesomething like, "Linksys" or “D-Link” or "Default (Unsecured)". [Linksys,
3Com, Netgear, D-Link, Microsoft Broadband are brand names of some wireless (wi-fi) routers]. This test is
like a Thermometer test, which measures the body temperature only. Higher body temperature means some
abnormality but cannot diagnose it. At the same time, normal temperature does not mean that all is normal.
3.2.Encryption schemes
There are many methos available for the wi-fi security, many encryption schemes such as EAP,TKIP,
AES, WEP, WPA,WPA2 etc and many security tips are develeped.
3.2.1.AES:- Advanced Encryption Standard is gaining acceptance as appropriate replacement for RC4 algorithm
in WEP. AES uses the Rijandale Algorithm and supports the following key lengths-128 bit, 192 bit, 256 bit.
AES is considered to be un-crack able by most Cryptographers. NIST has chosen AES for Federal Information
Processing Standard (FIPS). In order to improve wireless LAN security the 802.11i is considering inclusion of
AES in WEPv2.
3.2.2.TKIP:- The temporal key integrity protocol (TKIP), initially referred to as WEP2, is an interim solution
that fixes the key reuse problem of WEP, that is, periodically using the same key to encrypt data. The TKIP
process begins with a 128-bit "temporal key" shared among clients and access points. TKIP combines the
temporal key with the client's MAC address andthen adds a relatively large 16-octet initialization vector to
produce the key that will encrypt the data. This procedure ensuresthat each station uses different key streams to
encrypt the data [5].
3.2.3.WEP: - The industry’s solution: WEP (Wired Equivalent Privacy) [7], [5], [8], [9], [10]
 Share a single cryptographic key among all devices
 Encrypt all packets sent over the air, using the shared key
 Use a checksum to prevent injection of spoofed packets [6].
Some devices support the various versions of WEP-
 WEP-64-bit key (sometimes called WEP-40)
 WEP 128-bit key (sometimes called WEP-104)
 WEP 256-bit key.
Securing Wi-fi Network Via...
4
3.2.4.WAP:-WAP stands for Wi-Fi Protected Access [7], [5], [8], [9], [10]. This standard was developed to
replace WEP. Wi-Fi devices typically support multiple variations of WPA technology. Traditional WPA, also
known as WPA-Personal and sometimes also called WPA-PSK (for pre-shared key), is designed for home
networking while another version, WPAEnterprise, is designed for corporate networks.WAP2 is an improved
version of Wi-Fi Protected Access supported by all newer Wi-Fi equipment. Like WPA, WPA2 alsoexists in
Personal/PSK and Enterprise forms [8].
3.3.Protocol stack
The protocol stack for WLANs was designed such that existing applications can use them with minor
modifications. The three layers are same to other networks:-application, transport and network layers are same.
Proxy server works on upper three layers but mostly on the application layer.Proxy server plays very important
role in LAN network , in the same way if we add the proxy server to WLAN than in the same way with the help
of proxy server can protect the WLAN network also .Proxy server in between the clients and server.Proxy server
is also known as“application level gateway”.proxy server provides increased performance and security. In the
proxy server the data enters through one port and is forwarded to another port or the rest of the network.
Basically proxy server plays the two important role:-
3.3.1. Performance impovement:-Proxy servers saves the requests for a certain time period. Hence the
performance increases dramatically for a group of users.for example if a person p request for a web page ,after
some time another person q requests the same site than the proxy server returns the same web page for person q
that it already fetched for the person p,instead of forwarding the request to the server. Hence the time will be
saved .
3.3.2. Filteration:-Proxy severs can also povides the facility of the filtering. Porxy server povides the content
filteringapplication i.e. they control the content that may be relayed either in one direction or in the both
directions.Proxyserver can filter the requests.for example in school or in colleges certain web sites are blocked
or we can not open some web sites this can also be done with the help of the proxy servers.
3.4.Practical Aproach
A slew of products for securing corporate networks are available in the market. Firewalls prevent
unauthorized users from gaining access to the network . IDSs detect compromised machines in the network
.IPSec secures the communication channel between two authorized machines , and is frequently used byVPN
software. While these techniques are effective in reducing the number of attacks from outside the corporate
network, they do not secure the Wi-Fi network against the attacks. In particular, none of these can detect rogue
Wi-Fi devices and DoS attacks on Wi-Fi networks. The use of VPNs and IPSec is often not sufïŹcient, as we
discussed earlier. IDS products usually detect compromised machines once the attack is launched, and most
have a high false positive rate, which signiïŹcantly reduces their usefulness from the perspective of a network
administrator. In comparison, the DAIR security management system detects andlocates rogue Wi-Fi devices
and various DoS attacks with few false positives and minimal human intervention.There are several commercial
products in the area of corporate Wi-Fi security . Most use one of two approaches:they either rely on APs or
they use dedicated and expensive custom hardware sensors for RF monitoring. The marketing literature of these
products contains few technical details. Some commercial products rely on APs for monitoring wireless
networks . Although cost effective, this approach has several limitations. First, a single-radio AP can not easily
monitor multiple channels since its primary function requires it to spend most of its time on one speciïŹc channel
serving associated clients. Second, the APs usually have limited CPU power and memory resources, so polling
them (i.e., issuing SNMP queries) too frequently is problematic. Third, an AP only provides a view of one end
of the wireless communication, so an AP-based solution can not be used to detect problems such as RF holes or
excessive interference that primarily affect the client end of the communication. Finally, , monitoring the
network from an AP alone does not provide comprehensive coverage. To overcome these limitations, some
vendors augment the AP-based monitoring by deploying special sensor nodes throughout the organization .
However, such specialized sensors are expensive, and require careful planning for an effective deployment. We
are aware of only one prior research paper on detecting rogue devices . In this, mobile clients and APs monitor
the network and detect rogue devices. Cisco’s Wireless LAN Solution Engine uses a similar approach . The
proposed scheme has a few limitations. First, it is difïŹcult to guarantee complete coverage because the
monitoring sensors are mobile. Second, the amount of RF monitoring and reporting depends on the battery of
the mobile clients. Third, the algorithm proposed in Adya et al. ïŹ‚ags any unknown AP as a rogue device, even
if the AP is not plugged into the corporate network. Fourth, the proposed techniques do not detect rogue ad hoc
networks, and ïŹnally, the previous work does not detect DoS attacks on Wi-Fi networks.There is some prior
research on detecting greedy and malicious behavior in IEEE 802.11 networks. Bellardo et al. presenta study of
Securing Wi-fi Network Via...
5
various DoS attacks in IEEE 802.11 networks. Theydemonstrate the attacks, and present simple schemes to
counter them. The solution requires clients to cooperate with each other and in some cases, changes to IEEE
802.11. DAIR, on the other hand, detects these faults and reports them to the network administrator. The
detection framework for DAIR is more efïŹcient due to the presence of a larger number of sensors.DOMINO is
an AP based solution for detecting greedy behavior in IEEE 802.11 hotspots . Several other researchers have
proposed monitoring and characterization of wireless networks by polling the Aps.These systems have the same
drawbacks as other AP based solutions discussed earlier. The beneïŹts of dense sensor deployments were
presented in Conner et al. The focus of that paper was on environmental monitoring applications such as
temperature control or locating empty meeting rooms, and not Wi-Fi monitoring.
IV. CONCLUSION
WI-FI networks are growing day by day. The new challenges or we can say the security risks are also
increases day to day.We can impove the performance as well as the security with the help of proxy server ,if it is
implemented successfully.we can secure the WI-Fi network upto 5-10% with the help of the proxy server.
REFERENCES
[1] http://www.webopedia.com/TERM/W/Wi_Fi.html
[2] http://en.wikipedia.org/wiki/Proxy_server.
[3] Forward and Reverse Proxies". httpd mod_proxy. Apache. Retrieved 20 December 2010.
[4] Lyon, Gordon (2008). Nmap network scanning. US: Insecure. p. 270.ISBN 978-0-9799587-1-7.
[5] Wireless lan security today and tomorrow by Sangram Goyal and Dr. S. A. Vetha Manickam Center for Information and Network
Security Pune University.
[6] Wireless security ppt by David Wagner.
[7] The State of Wi-Fi¼ Security Wi-Fi CERTIFIEDℱ WPA2TM Delivers Advanced Security to Homes, Enterprises and Mobile
Devices by Wi-Fi Alliance.
[8] Introduction to Wi-Fi Network Security By Bradley Mitchell .
[9] Sara Nasre Wireless Lan Security Research Paper IT 6823 Information Security Instructor: Dr. Andy Ju An Wang Spring 2004.
[10] WI-FI security –WEP, WPA and WPA2 by Guillaume Lehembre.

Weitere Àhnliche Inhalte

Was ist angesagt?

Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALASaikiran Panjala
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...IRJET Journal
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Wlan security
Wlan securityWlan security
Wlan securityUpasona Roy
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moniMD MONIRUZZAMAN
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK IJNSA Journal
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 

Was ist angesagt? (20)

Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 

Andere mochten auch

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
A0420105
A0420105A0420105
A0420105inventy
 
D044027038
D044027038D044027038
D044027038inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
D043025035
D043025035D043025035
D043025035inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
C04216020
C04216020C04216020
C04216020inventy
 
E0312020029
E0312020029E0312020029
E0312020029inventy
 
D032021027
D032021027D032021027
D032021027inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
C041027036
C041027036C041027036
C041027036inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
A043001006
A043001006A043001006
A043001006inventy
 
G043055064
G043055064G043055064
G043055064inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 

Andere mochten auch (17)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A0420105
A0420105A0420105
A0420105
 
D044027038
D044027038D044027038
D044027038
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
D043025035
D043025035D043025035
D043025035
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
C04216020
C04216020C04216020
C04216020
 
E0312020029
E0312020029E0312020029
E0312020029
 
D032021027
D032021027D032021027
D032021027
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
C041027036
C041027036C041027036
C041027036
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A043001006
A043001006A043001006
A043001006
 
G043055064
G043055064G043055064
G043055064
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 

Ähnlich wie Research Inventy : International Journal of Engineering and Science

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Wireless Security
Wireless SecurityWireless Security
Wireless SecurityVignesh Suresh
 
Wireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security SoftwareWireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security SoftwareBRNSSPublicationHubI
 
woot15-paper-novella
woot15-paper-novellawoot15-paper-novella
woot15-paper-novellaEduardo Novella
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologyFaiq Ali Sayed
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.pptabenimelos
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfSeanHussey8
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedIRJET Journal
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 

Ähnlich wie Research Inventy : International Journal of Engineering and Science (20)

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security SoftwareWireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security Software
 
woot15-paper-novella
woot15-paper-novellawoot15-paper-novella
woot15-paper-novella
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 

Mehr von inventy

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...inventy
 
Copper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuelsinventy
 
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...inventy
 
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...inventy
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systemsinventy
 
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous ÎČ -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous ÎČ -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous ÎČ -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous ÎČ -Form Nuclea...inventy
 
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...inventy
 
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...inventy
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...inventy
 
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...inventy
 
Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...inventy
 
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...inventy
 
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...inventy
 
Transient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineTransient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineinventy
 
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...inventy
 
Impacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability EvaluationImpacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability Evaluationinventy
 
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable GenerationReliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable Generationinventy
 
The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...inventy
 
Experimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum FreezerExperimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum Freezerinventy
 
Growth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsGrowth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsinventy
 

Mehr von inventy (20)

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
 
Copper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuels
 
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
 
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systems
 
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous ÎČ -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous ÎČ -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous ÎČ -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous ÎČ -Form Nuclea...
 
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
 
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...
 
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
 
Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...
 
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
 
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
 
Transient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineTransient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbine
 
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
 
Impacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability EvaluationImpacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability Evaluation
 
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable GenerationReliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
 
The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...
 
Experimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum FreezerExperimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum Freezer
 
Growth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsGrowth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin films
 

KĂŒrzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

KĂŒrzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Research Inventy : International Journal of Engineering and Science

  • 1. Research Inventy: International Journal Of Engineering And Science Vol.3, Issue 7 (August 2013), PP 01-05 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com 1 Securing Wi-Fi Network Via Proxy Servers Surbhi Gupta1 , Puneet Bhalla1 1. Department of Computer Science , Dronacharaya college of engg., Gurgaon ABSTRACT : “Unsecured wi-fi network (genetically known as Wireless Local Area Network or WLAN) has become a national celebrity in vamp category due to it’s misuse by terrorists, in the recent past.Even otherwise, any open and unsecured node, especially wireless,is an extremely serious security hazard for any network, whether it is corporate, personal, home or small office user. Wi-fi networks are in the news in the recent past due to effective misuse of these by terror organisations. They have been misused asthese wireless (wi-fi) networks have been installed unsecured. Withthe misuse by terrorists, unsecured wi-fi misuse has become national celebrity in villain and vamp categories.” KEYWORDS: AES, DAIR, MAC, Proxy server, TKIP, WEP, WPA I. INTRODUCTION Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. The Wi-Fi Alliance, the organization that owns the Wi-Fi (registered trademark) term specifically definesWi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards."Initially, Wi-Fi was used in place of the 2.4 GHz 802.11b standardonly, however the Wi-Fi Al liance has expanded the generic use of the Wi-Fi term to include any type of network or WLAN product based on any of the 802.11 standards, including 802.11b,802.11a, dual-band, and so on, in an attempt tostop confusionabout wireless LAN interoperability.Wi-Fi works with no physical wiredconnection between sender andreceiver by using radio frequency (RF) technology, afrequency within the electromagnetic spectrum associated with radio wavepropagation. When an RF current is supplied to an antenna, an electromagnetic field is created that then is able to propagate through air or space. The cornerstone of any wireless network is an access point (AP). The primary job of an access point is to broadcast a wireless signal that computers can detect and "tune" into. In order to connect to an access point and join a wireless network, computers and devices must be equipped with wirelessnetwork adapters.Wi-Fi is supported by many appl ications and devices including video game consoles, home networks, PDAs, mobile phones, major operating systems, and other types of consumer electronics. Anyproducts that are tested and approved as "Wi-Fi Certified" (aregistered trademark) by the Wi-Fi Alliance are certified asinteroperable with each other, even if they are from differentmanufacturers. For example, a user with a Wi-Fi Certified productcan use any brand of access point with any other brand of clienthardware that also is also "Wi-Fi Certified". Products that pass thiscertification are required to carry an identifying seal on theirpackaging that states "Wi-Fi Certified" and indicates the radiofrequency band used (2.4 GHz for 802.11b, 802.11g, or 802.11n,and 5GHz for 802.11a).[1] 1.1.How to secure wi-fi and protect ourselves – The question arises – what a person must do to take care that the wireless network (wi-fi) is not misused by any anti-social, antinational or criminal element or anyone else, may be insider, who is not authorised to access / use the network. The question is: how to secure your wireless network or wi-fi network connection or access point (AP) .There are three important aspects of wireless (or any) security – A. Wireless network must be technically reasonably secured. B. User must be educated in security. C. Security must be monitored for weaknesses and breaches. 1.2.Checklist to protect your wireless (wi-fi) network 1.2.1.Mandatory Controls – 1. Change Default Administrator Passwords and Usernames 2. Turn on (Compatible) WPA / WEP Encryption 3. Enable Firewalls On Each Computer and the Router 4. Disable Auto-connect feature 5. Position the Router or Access Point (AP) Safely
  • 2. Securing Wi-fi Network Via... 2 6. Turn Off the power switch of Router/AP, when not in use 7. Assign Static IP Addresses to Devices 1.2.2.Desirable Controls - 8. Change the Default SSID 9. Disable SSID Broadcast 10. Enable MAC Address Filtering II. SCOPE OF STUDY Proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity.[2] A proxy server may run right on the user's local computer, or at various points between the user's computer and destination servers on the Internet.  A proxy server that passes requests and responses unmodified is usually called a gateway or sometimes a tunneling proxy.  A forward proxy is an Internet-facing proxy used to retrieve from a wide range of sources (in most cases anywhere on the Internet).  A reverse proxy is usually an Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching.[3] 2.1.Forward proxies A forward proxy taking requests from an internal network and forwarding them to Internet. Forward proxies are proxies where the client server names the target server to connect to.[3] Forward proxies are able to retrieve from a wide range of sources (in most cases anywhere on the Internet).The terms "forward proxy" and "forwarding proxy" are a general description of behavior (forwarding traffic) and thus ambiguous. Except for Reverse proxy, the types of proxies described in this article are more specialized sub- types of the general forward proxy concept. 2.2.Open proxies An open proxy forwarding requests from and to anywhere on the Internet. An open proxy is a forwarding proxy server that is accessible by any Internet user. Gordon Lyon estimates there are "hundreds of thousands" of open proxies on the Internet.[4] Ananonymous open proxy allows users to conceal their IP address while browsing the Web or using other Internet services. There are varying degrees of anonymity however, as well as a number of methods of 'tricking' the client into revealing itself regardless of the proxy being used.
  • 3. Securing Wi-fi Network Via... 3 2.3.Reverse proxies A reverse proxy taking requests from the Internet and forwarding them to servers in an internal network.Those making requests connect to the proxy and may not be aware of the internal network. A reverse proxy (or surrogate) is a proxy server that appears to clients to be an ordinary server. Requests are forwarded to one or more origin servers which handle the request. The response is returned as if it came directly from the web server.[3] Reverse proxies are installed in the neighborhood of one or more web servers. All traffic coming from the Internet and with a destination of one of the neighborhood's web servers goes through the proxy server. The use of "reverse" originates in its counterpart "forward proxy" since the reverse proxy sits closer to the web server and serves only a restricted set of websites. III. RELATED WORK 3.1.A very rudimentary test to verify your wireless network iscompletely unsecured – In the MS Windows environment, drag your mouse over the wireless icon in the bottom right corner (this corner is called the “system tray”) of your computer screen. This wil l display the name of your wireless network. If it shows the default name of the wireless network, as provided by the manufacturer, you have high probability of having an unsecured network. In unsecured network, this may be the make or model of your wireless router and you may seesomething like, "Linksys" or “D-Link” or "Default (Unsecured)". [Linksys, 3Com, Netgear, D-Link, Microsoft Broadband are brand names of some wireless (wi-fi) routers]. This test is like a Thermometer test, which measures the body temperature only. Higher body temperature means some abnormality but cannot diagnose it. At the same time, normal temperature does not mean that all is normal. 3.2.Encryption schemes There are many methos available for the wi-fi security, many encryption schemes such as EAP,TKIP, AES, WEP, WPA,WPA2 etc and many security tips are develeped. 3.2.1.AES:- Advanced Encryption Standard is gaining acceptance as appropriate replacement for RC4 algorithm in WEP. AES uses the Rijandale Algorithm and supports the following key lengths-128 bit, 192 bit, 256 bit. AES is considered to be un-crack able by most Cryptographers. NIST has chosen AES for Federal Information Processing Standard (FIPS). In order to improve wireless LAN security the 802.11i is considering inclusion of AES in WEPv2. 3.2.2.TKIP:- The temporal key integrity protocol (TKIP), initially referred to as WEP2, is an interim solution that fixes the key reuse problem of WEP, that is, periodically using the same key to encrypt data. The TKIP process begins with a 128-bit "temporal key" shared among clients and access points. TKIP combines the temporal key with the client's MAC address andthen adds a relatively large 16-octet initialization vector to produce the key that will encrypt the data. This procedure ensuresthat each station uses different key streams to encrypt the data [5]. 3.2.3.WEP: - The industry’s solution: WEP (Wired Equivalent Privacy) [7], [5], [8], [9], [10]  Share a single cryptographic key among all devices  Encrypt all packets sent over the air, using the shared key  Use a checksum to prevent injection of spoofed packets [6]. Some devices support the various versions of WEP-  WEP-64-bit key (sometimes called WEP-40)  WEP 128-bit key (sometimes called WEP-104)  WEP 256-bit key.
  • 4. Securing Wi-fi Network Via... 4 3.2.4.WAP:-WAP stands for Wi-Fi Protected Access [7], [5], [8], [9], [10]. This standard was developed to replace WEP. Wi-Fi devices typically support multiple variations of WPA technology. Traditional WPA, also known as WPA-Personal and sometimes also called WPA-PSK (for pre-shared key), is designed for home networking while another version, WPAEnterprise, is designed for corporate networks.WAP2 is an improved version of Wi-Fi Protected Access supported by all newer Wi-Fi equipment. Like WPA, WPA2 alsoexists in Personal/PSK and Enterprise forms [8]. 3.3.Protocol stack The protocol stack for WLANs was designed such that existing applications can use them with minor modifications. The three layers are same to other networks:-application, transport and network layers are same. Proxy server works on upper three layers but mostly on the application layer.Proxy server plays very important role in LAN network , in the same way if we add the proxy server to WLAN than in the same way with the help of proxy server can protect the WLAN network also .Proxy server in between the clients and server.Proxy server is also known as“application level gateway”.proxy server provides increased performance and security. In the proxy server the data enters through one port and is forwarded to another port or the rest of the network. Basically proxy server plays the two important role:- 3.3.1. Performance impovement:-Proxy servers saves the requests for a certain time period. Hence the performance increases dramatically for a group of users.for example if a person p request for a web page ,after some time another person q requests the same site than the proxy server returns the same web page for person q that it already fetched for the person p,instead of forwarding the request to the server. Hence the time will be saved . 3.3.2. Filteration:-Proxy severs can also povides the facility of the filtering. Porxy server povides the content filteringapplication i.e. they control the content that may be relayed either in one direction or in the both directions.Proxyserver can filter the requests.for example in school or in colleges certain web sites are blocked or we can not open some web sites this can also be done with the help of the proxy servers. 3.4.Practical Aproach A slew of products for securing corporate networks are available in the market. Firewalls prevent unauthorized users from gaining access to the network . IDSs detect compromised machines in the network .IPSec secures the communication channel between two authorized machines , and is frequently used byVPN software. While these techniques are effective in reducing the number of attacks from outside the corporate network, they do not secure the Wi-Fi network against the attacks. In particular, none of these can detect rogue Wi-Fi devices and DoS attacks on Wi-Fi networks. The use of VPNs and IPSec is often not sufïŹcient, as we discussed earlier. IDS products usually detect compromised machines once the attack is launched, and most have a high false positive rate, which signiïŹcantly reduces their usefulness from the perspective of a network administrator. In comparison, the DAIR security management system detects andlocates rogue Wi-Fi devices and various DoS attacks with few false positives and minimal human intervention.There are several commercial products in the area of corporate Wi-Fi security . Most use one of two approaches:they either rely on APs or they use dedicated and expensive custom hardware sensors for RF monitoring. The marketing literature of these products contains few technical details. Some commercial products rely on APs for monitoring wireless networks . Although cost effective, this approach has several limitations. First, a single-radio AP can not easily monitor multiple channels since its primary function requires it to spend most of its time on one speciïŹc channel serving associated clients. Second, the APs usually have limited CPU power and memory resources, so polling them (i.e., issuing SNMP queries) too frequently is problematic. Third, an AP only provides a view of one end of the wireless communication, so an AP-based solution can not be used to detect problems such as RF holes or excessive interference that primarily affect the client end of the communication. Finally, , monitoring the network from an AP alone does not provide comprehensive coverage. To overcome these limitations, some vendors augment the AP-based monitoring by deploying special sensor nodes throughout the organization . However, such specialized sensors are expensive, and require careful planning for an effective deployment. We are aware of only one prior research paper on detecting rogue devices . In this, mobile clients and APs monitor the network and detect rogue devices. Cisco’s Wireless LAN Solution Engine uses a similar approach . The proposed scheme has a few limitations. First, it is difïŹcult to guarantee complete coverage because the monitoring sensors are mobile. Second, the amount of RF monitoring and reporting depends on the battery of the mobile clients. Third, the algorithm proposed in Adya et al. ïŹ‚ags any unknown AP as a rogue device, even if the AP is not plugged into the corporate network. Fourth, the proposed techniques do not detect rogue ad hoc networks, and ïŹnally, the previous work does not detect DoS attacks on Wi-Fi networks.There is some prior research on detecting greedy and malicious behavior in IEEE 802.11 networks. Bellardo et al. presenta study of
  • 5. Securing Wi-fi Network Via... 5 various DoS attacks in IEEE 802.11 networks. Theydemonstrate the attacks, and present simple schemes to counter them. The solution requires clients to cooperate with each other and in some cases, changes to IEEE 802.11. DAIR, on the other hand, detects these faults and reports them to the network administrator. The detection framework for DAIR is more efïŹcient due to the presence of a larger number of sensors.DOMINO is an AP based solution for detecting greedy behavior in IEEE 802.11 hotspots . Several other researchers have proposed monitoring and characterization of wireless networks by polling the Aps.These systems have the same drawbacks as other AP based solutions discussed earlier. The beneïŹts of dense sensor deployments were presented in Conner et al. The focus of that paper was on environmental monitoring applications such as temperature control or locating empty meeting rooms, and not Wi-Fi monitoring. IV. CONCLUSION WI-FI networks are growing day by day. The new challenges or we can say the security risks are also increases day to day.We can impove the performance as well as the security with the help of proxy server ,if it is implemented successfully.we can secure the WI-Fi network upto 5-10% with the help of the proxy server. REFERENCES [1] http://www.webopedia.com/TERM/W/Wi_Fi.html [2] http://en.wikipedia.org/wiki/Proxy_server. [3] Forward and Reverse Proxies". httpd mod_proxy. Apache. Retrieved 20 December 2010. [4] Lyon, Gordon (2008). Nmap network scanning. US: Insecure. p. 270.ISBN 978-0-9799587-1-7. [5] Wireless lan security today and tomorrow by Sangram Goyal and Dr. S. A. Vetha Manickam Center for Information and Network Security Pune University. [6] Wireless security ppt by David Wagner. [7] The State of Wi-FiÂź Security Wi-Fi CERTIFIEDℱ WPA2TM Delivers Advanced Security to Homes, Enterprises and Mobile Devices by Wi-Fi Alliance. [8] Introduction to Wi-Fi Network Security By Bradley Mitchell . [9] Sara Nasre Wireless Lan Security Research Paper IT 6823 Information Security Instructor: Dr. Andy Ju An Wang Spring 2004. [10] WI-FI security –WEP, WPA and WPA2 by Guillaume Lehembre.