{"title":"安全与对策无线通信算法与渗透测试","authors":"Shahan Yamin Siddiqui","doi":"10.54692/lgurjcsit.2020.0402132","DOIUrl":null,"url":null,"abstract":"The communication algorithm security, in general, is a pending issue that has only recently become aware. In wireless communication algorithms, this need is more obvious, by its characteristics, and is part of the design of Wi-Fi communication algorithms. The biggest security problem of Wi-Fi communication algorithms is given by its spatial dispersion. It is not limited to an area, a cable or optical fiber, or has specific access points or connection, but it expands and is accessible from any point within its coverage. This makes it very vulnerable to wireless communication algorithms because of the physical security of this communication algorithm is difficult to secure.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security and Countermeasures Wireless Communication Algorithm with Penetration Testing\",\"authors\":\"Shahan Yamin Siddiqui\",\"doi\":\"10.54692/lgurjcsit.2020.0402132\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The communication algorithm security, in general, is a pending issue that has only recently become aware. In wireless communication algorithms, this need is more obvious, by its characteristics, and is part of the design of Wi-Fi communication algorithms. The biggest security problem of Wi-Fi communication algorithms is given by its spatial dispersion. It is not limited to an area, a cable or optical fiber, or has specific access points or connection, but it expands and is accessible from any point within its coverage. This makes it very vulnerable to wireless communication algorithms because of the physical security of this communication algorithm is difficult to secure.\",\"PeriodicalId\":197260,\"journal\":{\"name\":\"Lahore Garrison University Research Journal of Computer Science and Information Technology\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Lahore Garrison University Research Journal of Computer Science and Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.54692/lgurjcsit.2020.0402132\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Lahore Garrison University Research Journal of Computer Science and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54692/lgurjcsit.2020.0402132","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security and Countermeasures Wireless Communication Algorithm with Penetration Testing
The communication algorithm security, in general, is a pending issue that has only recently become aware. In wireless communication algorithms, this need is more obvious, by its characteristics, and is part of the design of Wi-Fi communication algorithms. The biggest security problem of Wi-Fi communication algorithms is given by its spatial dispersion. It is not limited to an area, a cable or optical fiber, or has specific access points or connection, but it expands and is accessible from any point within its coverage. This makes it very vulnerable to wireless communication algorithms because of the physical security of this communication algorithm is difficult to secure.