z-logo
open-access-imgOpen Access
A SURVEY ON AUTHENTICATION TECHNIQUES FOR WIRELESS MEDIUM
Author(s) -
. Pradeep,
. Manjunath
Publication year - 2018
Publication title -
international journal of research - granthaalayah
Language(s) - English
Resource type - Journals
eISSN - 2394-3629
pISSN - 2350-0530
DOI - 10.29121/granthaalayah.v6.i5.2018.1464
Subject(s) - computer science , wireless network , computer security , wireless , wireless security , computer network , authentication (law) , wireless intrusion prevention system , flexibility (engineering) , wi fi array , telecommunications , statistics , mathematics
The wireless communication technology gaining importance in extreme conditions in a very effective way due to its benefits. Compared to wired networks, wireless networks have many benefits in terms of flexibility, cost, and mobility. Wireless networks can be easily hacked by the outsiders if there is no proper security. Because of its increasing popularity, wireless networks need proper security measures in addition to the normal protections such as firewalls, virus detectors, etc. Providing the required additional security to the wireless networks is a challenging task. Security can be maintained by providing data authenticity, integrity confidentiality, and authorization. A survey on the security of wireless networks is put forward that discusses various techniques which help in protecting the network and a cryptic secure scheme has been proposed which helps to enhance the security standards in the wireless medium.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here