Research on Security of the WLAN Campus Network karthik.k 1 st  sem, M.Tech, CNE
OUTLINE   WLAN Benefits. WLAN Standards. The 3 Feathers of WLAN. Security Threats. Existing Security.  New Security Control Program.  Conclusion. References. Dept of CSE, DSCE  2010
WLAN Benefits  Easy Installation. Wide Range of Covering. Economical. High transfer rate. Dept of CSE, DSCE  2010
WLAN Standards IEEE 802.11b IEEE 802.11a IEEE 802.11g Dept of CSE, DSCE  2010
The Three Feathers of WLAN The Openness of WLAN. The Mobility of Node. The Instability of Signal. Dept of CSE, DSCE  2010
Security Threats AP Unauthorized Access. Information Eavesdropping. Signal Interference. Denial of service. Dept of CSE, DSCE  2010
Existing Security Technologies SSID. MAC Filtering. WEP. Dept of CSE, DSCE  2010
New Security Control Program Proposed Access Control. Content Filtering. Data Encryption. User Management. Log Audit. Dept of CSE, DSCE  2010
Access Control VP N :Replace existing WEP  protocol Solutions. Port Access Control[802.1x] Dept of CSE, DSCE  2010
Content Filtering Use Software Filters. Use Hardware Filters. Dept of CSE, DSCE  2010
Data Encryption Include larger strength Encryption technologies. Replace Existing WEP by WPA. Dept of CSE, DSCE  2010
User Management Use of different Grades with different permission levels. Prohibit installing unauthorized AP. Dept of CSE, DSCE  2010
Log Audit Audit log file. Store messages about software,  services, operating system or hardware devices. Dept of CSE, DSCE  2010
Conclusion Access control, content filtering, data  encryption, user mgmt. & several  other aspects, expected to provide  some help with the construction of  Digital Campus Network. WLAN will play a more important role in  colleges because of its high speed  transmission capacity & flexibility. Dept of CSE, DSCE  2010
References Yong Yu, Wireless Distribution System in Management, 2007.5 Yong Yu, “Research on Wireless Distribution System in campus Network,” ACC 2009 IEEE Std 802.1X-2001:IEEE Standard for Local & Metropolitan area networks ports based network access control.USA:IEEE,2001 Yunwu Dai, “Analysis of Wireless Local Network Security” Science Mosaic.2008,12 Xiaohong Zhang, “Wireless LAN’s Security Mechanism,2006 Dept of CSE, DSCE  2010
Thank You Dept of CSE, DSCE  2010

More Related Content

PDF
IDS / IPS Survey
PDF
Multipath Dynamic Source Routing Protocol using Portfolio Selection
PPTX
Security protocols & platform for wsn based medical applications
PPTX
Security Method in Data Acquisition Wireless Sensor Network
PDF
Efficient Data Aggregation in Wireless Sensor Networks
PDF
International Journal of Network Security & Its Applications (IJNSA) - Curre...
PDF
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
PDF
Requisite Trust Based Routing Protocol for WSN
IDS / IPS Survey
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Security protocols & platform for wsn based medical applications
Security Method in Data Acquisition Wireless Sensor Network
Efficient Data Aggregation in Wireless Sensor Networks
International Journal of Network Security & Its Applications (IJNSA) - Curre...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
Requisite Trust Based Routing Protocol for WSN

What's hot (20)

PDF
A trust-based authentication framework for security of WPAN using network sli...
PDF
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
PDF
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
PDF
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
PDF
A Security Framework for Replication Attacks in Wireless Sensor Networks
PDF
Integrated Framework for Secure and Energy Efficient Communication System in ...
DOCX
Secure final
PDF
Wireless Sensor Network Simulators: A Survey and Comparisons
DOCX
Refercences
PPT
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
PDF
LAN Design and implementation of Shanto Mariam University of Creative Technology
PDF
Ijnsa050204
PPTX
Networking Research Projects Help
PPTX
Campus Area Network Security
PDF
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
PPTX
Poster for Snickers Conference(Afghah Version)
PDF
PDF
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
PDF
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
PDF
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
A trust-based authentication framework for security of WPAN using network sli...
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
A Security Framework for Replication Attacks in Wireless Sensor Networks
Integrated Framework for Secure and Energy Efficient Communication System in ...
Secure final
Wireless Sensor Network Simulators: A Survey and Comparisons
Refercences
Secure and Privacy Enhanced Authentication & Authorization Protocol in Cloud
LAN Design and implementation of Shanto Mariam University of Creative Technology
Ijnsa050204
Networking Research Projects Help
Campus Area Network Security
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Poster for Snickers Conference(Afghah Version)
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Ad

Viewers also liked (20)

PPS
Iuwne10 S04 L06
PPTX
Install a new windows server 2008 r2 forest
PPS
Iuwne10 S04 L03
PPTX
Step by step procedure to set up a
PPSX
Security & Privacy in WLAN - A Primer and Case Study
PPT
Wlan security
PPTX
Severe Acute Respiratory Syndrome (SARS) : Treatment and prophylaxis with Re...
PPT
Severe Acute Respiratory Syndrome
PPTX
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
PPTX
Wireless Security null seminar
PPTX
Severe acute respiratory syndrome
PPT
Sars Presentation
PPTX
Wlan security
PPT
Ch06 Wireless Network Security
PDF
Epidemic of Epidemics
PPT
Windows Server 2008 R2 Overview
PPT
Message Authentication: MAC, Hashes
PDF
Computer systems servicing cbc
Iuwne10 S04 L06
Install a new windows server 2008 r2 forest
Iuwne10 S04 L03
Step by step procedure to set up a
Security & Privacy in WLAN - A Primer and Case Study
Wlan security
Severe Acute Respiratory Syndrome (SARS) : Treatment and prophylaxis with Re...
Severe Acute Respiratory Syndrome
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
Wireless Security null seminar
Severe acute respiratory syndrome
Sars Presentation
Wlan security
Ch06 Wireless Network Security
Epidemic of Epidemics
Windows Server 2008 R2 Overview
Message Authentication: MAC, Hashes
Computer systems servicing cbc
Ad

Similar to Research on security of the wlan campus network (20)

PDF
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
PDF
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
PDF
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
PDF
Evaluation of enhanced security solutions in
PPTX
SM Mastering-WLAN-Connectivity-Unleashed.pptx
PPTX
lecture_5.pptx
PDF
Latest Developments in WirelessNetworking and Wireless Security
PPTX
802.11ac
PPT
Meru Presentation
PDF
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
PPT
Wi Fi Technology
PDF
A Framework for Wireless LAN Monitoring and Its Applications 
PDF
A framework for wireless lan monitoring and its applications
PDF
Wi-Fi & Smart E-learning Experience at SOA University
PDF
J010216776
DOCX
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
PPTX
Communication standard
PPT
Ieee 802.11 wireless lan
PPT
Ieee 802.11 wireless lan
PDF
Experimental analysis of channel interference in ad hoc network
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of enhanced security solutions in
SM Mastering-WLAN-Connectivity-Unleashed.pptx
lecture_5.pptx
Latest Developments in WirelessNetworking and Wireless Security
802.11ac
Meru Presentation
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Wi Fi Technology
A Framework for Wireless LAN Monitoring and Its Applications 
A framework for wireless lan monitoring and its applications
Wi-Fi & Smart E-learning Experience at SOA University
J010216776
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Communication standard
Ieee 802.11 wireless lan
Ieee 802.11 wireless lan
Experimental analysis of channel interference in ad hoc network

Recently uploaded (20)

PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Trump Administration's workforce development strategy
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
HVAC Specification 2024 according to central public works department
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
advance database management system book.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Hazard Identification & Risk Assessment .pdf
History, Philosophy and sociology of education (1).pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Trump Administration's workforce development strategy
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Unit 4 Computer Architecture Multicore Processor.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Uderstanding digital marketing and marketing stratergie for engaging the digi...
FORM 1 BIOLOGY MIND MAPS and their schemes
HVAC Specification 2024 according to central public works department
What if we spent less time fighting change, and more time building what’s rig...
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
Share_Module_2_Power_conflict_and_negotiation.pptx
advance database management system book.pdf

Research on security of the wlan campus network

  • 1. Research on Security of the WLAN Campus Network karthik.k 1 st sem, M.Tech, CNE
  • 2. OUTLINE WLAN Benefits. WLAN Standards. The 3 Feathers of WLAN. Security Threats. Existing Security. New Security Control Program. Conclusion. References. Dept of CSE, DSCE 2010
  • 3. WLAN Benefits Easy Installation. Wide Range of Covering. Economical. High transfer rate. Dept of CSE, DSCE 2010
  • 4. WLAN Standards IEEE 802.11b IEEE 802.11a IEEE 802.11g Dept of CSE, DSCE 2010
  • 5. The Three Feathers of WLAN The Openness of WLAN. The Mobility of Node. The Instability of Signal. Dept of CSE, DSCE 2010
  • 6. Security Threats AP Unauthorized Access. Information Eavesdropping. Signal Interference. Denial of service. Dept of CSE, DSCE 2010
  • 7. Existing Security Technologies SSID. MAC Filtering. WEP. Dept of CSE, DSCE 2010
  • 8. New Security Control Program Proposed Access Control. Content Filtering. Data Encryption. User Management. Log Audit. Dept of CSE, DSCE 2010
  • 9. Access Control VP N :Replace existing WEP protocol Solutions. Port Access Control[802.1x] Dept of CSE, DSCE 2010
  • 10. Content Filtering Use Software Filters. Use Hardware Filters. Dept of CSE, DSCE 2010
  • 11. Data Encryption Include larger strength Encryption technologies. Replace Existing WEP by WPA. Dept of CSE, DSCE 2010
  • 12. User Management Use of different Grades with different permission levels. Prohibit installing unauthorized AP. Dept of CSE, DSCE 2010
  • 13. Log Audit Audit log file. Store messages about software, services, operating system or hardware devices. Dept of CSE, DSCE 2010
  • 14. Conclusion Access control, content filtering, data encryption, user mgmt. & several other aspects, expected to provide some help with the construction of Digital Campus Network. WLAN will play a more important role in colleges because of its high speed transmission capacity & flexibility. Dept of CSE, DSCE 2010
  • 15. References Yong Yu, Wireless Distribution System in Management, 2007.5 Yong Yu, “Research on Wireless Distribution System in campus Network,” ACC 2009 IEEE Std 802.1X-2001:IEEE Standard for Local & Metropolitan area networks ports based network access control.USA:IEEE,2001 Yunwu Dai, “Analysis of Wireless Local Network Security” Science Mosaic.2008,12 Xiaohong Zhang, “Wireless LAN’s Security Mechanism,2006 Dept of CSE, DSCE 2010
  • 16. Thank You Dept of CSE, DSCE 2010