The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard
American Journal of Software Engineering and Applications
Volume 5, Issue 3-1, May 2016, Pages: 34-39
Received: Sep. 14, 2016;
Accepted: Sep. 23, 2016;
Published: Aug. 21, 2017
Views 1762 Downloads 63
Zeinab Heidari, Computer and IT Department, University of Applied Science and Technology, Talesh, Guilan, Iran
Morteza Elme Maryan, Computer and IT Department, University of Applied Science and Technology, Talesh, Guilan, Iran
Network attacks are one of the most complicated and major problems in the web. There is a strong need for promoting web security, particularly in the wireless network domain. In this paper, the network security based on the IEEE 802.11 standard has been promoted and discussed. We present our idea on the integration of both access points and a proxy as well as the AES algorithm to provide the network security to a certain degree that the attacker cannot have influence on the network easily.
Morteza Elme Maryan,
The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard, American Journal of Software Engineering and Applications. Special Issue: Advances in Computer Science and Information Technology in Developing Countries.
Vol. 5, No. 3-1,
2016, pp. 34-39.
R. Bhoyar, M. Ghonge, and S. Gupta, "Comparative Study on IEEE Standard of Wireless LAN/Wi-Fi 802.11 a/b/g/n," International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE), vol. 2, 2013.
J. Soryal, I. M. Perera, I. Darwish, N. Fazio, R. Gennaro, and T. Saadawi, Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption, 2014.
A. Garg, "IEEE 802.11: Security," ed, 2010.
Y. E. H. El Idrissi, N. Zahid, and M. Jedra, "A New EAP Authentication Method for IEEE 802.11 Wireless," IJCSNS, vol. 11, p. 1, 2011.
P. J. F. Ruiz, F. B. Hidalgo, J. Santa Lozano, and A. F. Skarmeta, "Deploying ITS Scenarios Providing Security and Mobility Services Based on IEEE 802.11 p Technology," InTech, Feb, 2013.
P. K. DEVI, "SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW."
M. Mina, A. G. Abdul Azim, and S. Shamala, "Design and implementation of a lightweight security model to prevent IEEE 802.11 Wireless DoS attacks," EURASIP Journal on Wireless Communications and Networking, vol. 2011, 2011.
U. Kumar and S. Gambhir, "A Literature Review of Security Threats to Wireless Networks," International Journal of Future Generation Communication & Networking, vol. 7, 2014.
A. Reinhardt, D. Seither, A. König, R. Steinmetz, and M. Hollick, "Protecting IEEE 802.11 s wireless mesh networks against insider attacks," in LCN, 2012, pp. 224-227.
S. Boyer, J. M. Robert, H. Otrok, and C. Rousseau, "An adaptive tit–for–tat strategy for IEEE 802.11 CSMA/CA protocol," International Journal of Security and Networks, vol. 7, pp. 95-106, 2012.
A. Tsitroulis, D. Lampoudis, and E. Tsekleves, "Exposing WPA2 security protocol vulnerabilities," International Journal of Information and Computer Security, vol. 6, pp. 93-107, 2014.
G. Kaur and N. Madaan, "A Comparative Study of AES Encryption Decryption," International Journal, 2014.
M. Mina, A. G. Abdul Azim, and S. Shamala, "Design of cyberwar laboratory exercises to implement common security attacks against IEEE 802.11 wireless networks," Journal of Computer Systems, Networks, and Communications, vol. 2010, 2011.
T. Farooq, D. Jones, and M. Merabti, "MAC Layer DoS Attacks in IEEE 802.11 Networks," in The 11th Annual Conference on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2010), Liverpool, UK, 2010.
L. Kurup, M. V. Shah, and M. D. Shah, "Comparative Study of Attacks on Security Protocols," identity, vol. 3, 2014.
J. P. de Carvalho, H. Veiga, N. Marques, C. R. Pacheco, and A. Reis, "Laboratory performance of Wi-Fi IEEE 802.11 B, G WPA2 point-to-point links: a case study," in Proceedings of the World Congress on Engineering, 2011.