The serious issue in the field of wireless communication is the security and how an organization implements the steps against security breach. The major attack on any organization is Man in the Middle attack which is difficult to manage. This attack leads to number of unauthorized access points, called rogue access points which are not detected easily. In this paper, we proposed a Hopfield Neural Network approach for an automatic detection of these rogue access points in wireless networking. Here, we store the passwords of the authentic devices in the weight matrix format and match the patterns at the time of login. Simulation experiment shows that this method is more secure than the traditional one in WLAN
Wi-Fi hotspot or Access point indicates many threats that lead to compromise a user's identity, pers...
This paper proposes a practical physical tampering detection mechanism using inexpensive commercial ...
© 2011 International Federation for Information Processing. This is the accepted manuscript version ...
The serious issue in the field of wireless communication is the security and how an organization imp...
Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if no...
This work demonstrates a new intelligent approach to recognise probe request attacks in Wireless Loc...
Wireless local area networks (WLAN) are increasingly deployed and widespread worldwide due to the co...
For the Wireless Networks, presence of unapproved access points is becoming the major security issue...
Confidentiality of the communication is extremely important in wireless networks due to the broadcas...
Part 18: The Applications of Soft Computing to Telecommunications (ASCOTE) WorkshopInternational aud...
Widespread use of wireless networks has made security a serious issue. This thesis proposes misuse b...
IEEE 802.11 wireless networks (WLANs) through its evolution stages are vulnerable for service availa...
Recently, RF fingerprinting has become an arousing and emerging technology in identifying multiple w...
Abstract- The existence of rough access points in the network is now days becoming very serious secu...
This paper discusses an application of a neural network in wireless sensor network security. It pres...
Wi-Fi hotspot or Access point indicates many threats that lead to compromise a user's identity, pers...
This paper proposes a practical physical tampering detection mechanism using inexpensive commercial ...
© 2011 International Federation for Information Processing. This is the accepted manuscript version ...
The serious issue in the field of wireless communication is the security and how an organization imp...
Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if no...
This work demonstrates a new intelligent approach to recognise probe request attacks in Wireless Loc...
Wireless local area networks (WLAN) are increasingly deployed and widespread worldwide due to the co...
For the Wireless Networks, presence of unapproved access points is becoming the major security issue...
Confidentiality of the communication is extremely important in wireless networks due to the broadcas...
Part 18: The Applications of Soft Computing to Telecommunications (ASCOTE) WorkshopInternational aud...
Widespread use of wireless networks has made security a serious issue. This thesis proposes misuse b...
IEEE 802.11 wireless networks (WLANs) through its evolution stages are vulnerable for service availa...
Recently, RF fingerprinting has become an arousing and emerging technology in identifying multiple w...
Abstract- The existence of rough access points in the network is now days becoming very serious secu...
This paper discusses an application of a neural network in wireless sensor network security. It pres...
Wi-Fi hotspot or Access point indicates many threats that lead to compromise a user's identity, pers...
This paper proposes a practical physical tampering detection mechanism using inexpensive commercial ...
© 2011 International Federation for Information Processing. This is the accepted manuscript version ...