Wireless Security Network Using Authentication and Encryption

Authors

  • Dukitha M Dept. of Master of Computer Applications, Er.Perumal Manimekalai College of Engineering, Hosur
  • Sheeba G Dept. of Master of Computer Applications, Er.Perumal Manimekalai College of Engineering, Hosur

Keywords:

Wireless, WLAN, Security, Internet, Protection, Cyber threats

Abstract

The 21th Century is defined by human scientific breakthroughs. One of them is the global use of the Internet. Almost every educated person nowadays knows more or less about the internet. Thereby, a large percentage of the human populations make use of the internet on a daily basis. Wireless internet access is thereby made affordable and accessible for everyone and that has boosted human communication and economy development into a new era. However, along with benefits, wireless internet access also possesses several risks and threats of security. The Internet has become a fertile land for criminals of all kinds to operate. Most of the time what they try to take is personal information, some of them of extreme values and sensitivity, from naive and unaware users. In that sense, a comprehensive study on how cybercriminal carry out their attacks and how to avoid and actually prevent such attacks if possible would be beneficial for the righteous netizens.

References

[I] Peter Rysavy, "Secure Wireless Networking Using SSL VPNs," Rysavy Research, [© 2005 Aventail Corp. All rights reserved. Aventail Corporation, 808 Howell St., Second Floor, Seattle, WA 98101], Rysavy Research, PO Box 680, Hood River, OR 97031U.S.A., 2005

[2] Robert Whitely, Stan Schatt and Benjamin Gray."SSL Is the Future of Remote Access VPNs," © 1997-2005, Forrester Research, Inc. All rights reserved. Forrester Research, Inc., 400 Technology Square, Cambridge, MA 02139, USA), June, 2004.

[3] Fred Sandsmark, "Securing Wireless Networks," Copyright © 2005 Cisco Systems, Inc. All rights reserved. Cisco Systems, Inc., 170 West Tasman Dr., San Jose, CA 95134, USA [iQ Magazine (vil. VI,No. 1)., 2005.

[4] Jupitermedia Headquarters, Jupiter Research, 23 Old Kings Highway South, Darien, CT 06820, 2005.

[5] Scott Robinson, "Strengthen Your Wireless Security By Avoiding These Missteps," Copyright ©2005 CNET Networks, Inc. All rights reserved. TechRepublic, 235 Second Street, San Francisco, CA 94105, 2005.

[6] "End Point Control: Secure Anywhere Access With Reduced Risk And Increased IT Control," © 2004 Aventail Corp. All rights reserved. Aventail Corporation, 808 Howell St., Second Floor, Seattle, WA 98101, 2004.

[7] John R. Vacca, Firewalls : Jumpstart for Network and Systems Administrators, Digital Press, 2004.

[8] John R. Vacca, Net Privacy: A Guide to Developing and Implementing an Ironclad ebusiness Privacy Plan, McGraw-Hill, 2001.

[9] John R. Vacca, The Essential Guide To Storage Area Networks, Prentice Hall, 2002.

[10] John R. Vacca, Wireless Data Demystified (Mcgraw-Hill Demystified Series) (Paperback)s, McGraw-Hill Professional, 2003.

Downloads

Published

2025-11-25

How to Cite

[1]
M. Dukitha and G. Sheeba, “Wireless Security Network Using Authentication and Encryption”, Int. J. Comp. Sci. Eng., vol. 7, no. 17, pp. 109–112, Nov. 2025.