{"title":"Wireless network security: Tough times","authors":"Utkarsh Wadhwa","doi":"10.1109/ICGCIOT.2015.7380613","DOIUrl":null,"url":null,"abstract":"Since, the development of the IEEE standard for Wireless network 802.11, it has faced many challenges and issues, continuous development of the exploits have left the wireless network unsecure and compromisation on the CIA triad i.e. Confidentiality, Integrity and the Availability of the 802.11 networks. Although we know that wireless devices are so small and majority of the users are working on the mobile phones for their day to day use due to which hackers or the unethical elements of the society find it a cake walk to attack on these devices. This paper is about some of the most dangerous attacks left unexplored by the people, an eye-opener for the non-specialized users to cover the patches and also on the challenges and issues of the wireless security.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICGCIOT.2015.7380613","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Since, the development of the IEEE standard for Wireless network 802.11, it has faced many challenges and issues, continuous development of the exploits have left the wireless network unsecure and compromisation on the CIA triad i.e. Confidentiality, Integrity and the Availability of the 802.11 networks. Although we know that wireless devices are so small and majority of the users are working on the mobile phones for their day to day use due to which hackers or the unethical elements of the society find it a cake walk to attack on these devices. This paper is about some of the most dangerous attacks left unexplored by the people, an eye-opener for the non-specialized users to cover the patches and also on the challenges and issues of the wireless security.