SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Research on Security of the WLAN Campus Network karthik.k 1 st  sem, M.Tech, CNE
OUTLINE   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
WLAN Benefits  ,[object Object],[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
WLAN Standards ,[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
The Three Feathers of WLAN ,[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
Security Threats ,[object Object],[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
Existing Security Technologies ,[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
New Security Control Program Proposed ,[object Object],[object Object],[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
Access Control ,[object Object],[object Object],Dept of CSE, DSCE  2010
Content Filtering ,[object Object],[object Object],Dept of CSE, DSCE  2010
Data Encryption ,[object Object],[object Object],Dept of CSE, DSCE  2010
User Management ,[object Object],[object Object],Dept of CSE, DSCE  2010
Log Audit ,[object Object],[object Object],Dept of CSE, DSCE  2010
Conclusion ,[object Object],[object Object],Dept of CSE, DSCE  2010
References ,[object Object],[object Object],[object Object],[object Object],[object Object],Dept of CSE, DSCE  2010
Thank You Dept of CSE, DSCE  2010

Weitere ähnliche Inhalte

Was ist angesagt?

Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
IJCSIS Research Publications
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in CloudSecure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Umer Khalid
 
Poster for Snickers Conference(Afghah Version)
Poster for Snickers Conference(Afghah Version)Poster for Snickers Conference(Afghah Version)
Poster for Snickers Conference(Afghah Version)
Jabari Stegall
 

Was ist angesagt? (20)

A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )International Journal of Advanced Smart Sensor Network Systems  ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...
 
Secure final
Secure finalSecure final
Secure final
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and Comparisons
 
Refercences
RefercencesRefercences
Refercences
 
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in CloudSecure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
 
LAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative TechnologyLAN Design and implementation of Shanto Mariam University of Creative Technology
LAN Design and implementation of Shanto Mariam University of Creative Technology
 
Ijnsa050204
Ijnsa050204Ijnsa050204
Ijnsa050204
 
Networking Research Projects Help
Networking Research Projects Help Networking Research Projects Help
Networking Research Projects Help
 
Campus Area Network Security
Campus Area Network SecurityCampus Area Network Security
Campus Area Network Security
 
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
 
Poster for Snickers Conference(Afghah Version)
Poster for Snickers Conference(Afghah Version)Poster for Snickers Conference(Afghah Version)
Poster for Snickers Conference(Afghah Version)
 
Resume
ResumeResume
Resume
 
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 

Andere mochten auch

Install a new windows server 2008 r2 forest
Install a new windows server 2008 r2 forestInstall a new windows server 2008 r2 forest
Install a new windows server 2008 r2 forest
Raghu nath
 
Severe acute respiratory syndrome
Severe acute respiratory syndromeSevere acute respiratory syndrome
Severe acute respiratory syndrome
Aini Alwee
 
Sars Presentation
Sars PresentationSars Presentation
Sars Presentation
cglace
 
Epidemic of Epidemics
Epidemic of EpidemicsEpidemic of Epidemics
Epidemic of Epidemics
Elise Paradis
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
Alexander Schek
 

Andere mochten auch (20)

Iuwne10 S04 L06
Iuwne10 S04 L06Iuwne10 S04 L06
Iuwne10 S04 L06
 
Install a new windows server 2008 r2 forest
Install a new windows server 2008 r2 forestInstall a new windows server 2008 r2 forest
Install a new windows server 2008 r2 forest
 
Iuwne10 S04 L03
Iuwne10 S04 L03Iuwne10 S04 L03
Iuwne10 S04 L03
 
Step by step procedure to set up a
Step by step procedure to set up aStep by step procedure to set up a
Step by step procedure to set up a
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
SARS
SARSSARS
SARS
 
Wlan security
Wlan securityWlan security
Wlan security
 
Severe Acute Respiratory Syndrome (SARS) : Treatment and prophylaxis with Re...
Severe Acute Respiratory Syndrome (SARS)  : Treatment and prophylaxis with Re...Severe Acute Respiratory Syndrome (SARS)  : Treatment and prophylaxis with Re...
Severe Acute Respiratory Syndrome (SARS) : Treatment and prophylaxis with Re...
 
Severe Acute Respiratory Syndrome
Severe Acute Respiratory SyndromeSevere Acute Respiratory Syndrome
Severe Acute Respiratory Syndrome
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Severe acute respiratory syndrome
Severe acute respiratory syndromeSevere acute respiratory syndrome
Severe acute respiratory syndrome
 
SARS
SARSSARS
SARS
 
Sars Presentation
Sars PresentationSars Presentation
Sars Presentation
 
Wlan security
Wlan securityWlan security
Wlan security
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Epidemic of Epidemics
Epidemic of EpidemicsEpidemic of Epidemics
Epidemic of Epidemics
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
 
Message Authentication: MAC, Hashes
Message Authentication: MAC, HashesMessage Authentication: MAC, Hashes
Message Authentication: MAC, Hashes
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
 

Ähnlich wie Research on security of the wlan campus network

Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
CSCJournals
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
IJCSIS Research Publications
 
A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 
2012engg
 
A framework for wireless lan monitoring and its applications
A framework for wireless lan monitoring and its applicationsA framework for wireless lan monitoring and its applications
A framework for wireless lan monitoring and its applications
2012engg
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Lindsey Landolfi
 

Ähnlich wie Research on security of the wlan campus network (20)

Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
lecture_5.pptx
lecture_5.pptxlecture_5.pptx
lecture_5.pptx
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
802.11ac
802.11ac802.11ac
802.11ac
 
Meru Presentation
Meru PresentationMeru Presentation
Meru Presentation
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 
 
A framework for wireless lan monitoring and its applications
A framework for wireless lan monitoring and its applicationsA framework for wireless lan monitoring and its applications
A framework for wireless lan monitoring and its applications
 
Wi-Fi & Smart E-learning Experience at SOA University
Wi-Fi & Smart E-learning Experience at SOA UniversityWi-Fi & Smart E-learning Experience at SOA University
Wi-Fi & Smart E-learning Experience at SOA University
 
J010216776
J010216776J010216776
J010216776
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
Communication standard
Communication standardCommunication standard
Communication standard
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Experimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc networkExperimental analysis of channel interference in ad hoc network
Experimental analysis of channel interference in ad hoc network
 
Pdf3
Pdf3Pdf3
Pdf3
 

Kürzlich hochgeladen

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Kürzlich hochgeladen (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Research on security of the wlan campus network