Access Point Checking to Improve Security in Wireless Infrastructure Networks

Security issues are taken into consideration for many applications and are also an integral part of computer networks. On one hand, security especially comes into picture when transferring data from one device to another. On the other hand, rapid migration of networks from wired to wireless increase security complications among these networks. This research paper, initially describes the security issues over wireless infrastructure networks, and identifies different types of attackers. The 802.11 standard security mechanisms as well as some encryption techniques such as RSA are discussed. A new methodology called Access Point Checking is then proposed which relies on a checksum-bit check at the access point before completing the data transfer. This technique outperforms traditional security mechanisms in terms of timing characteristics.

[1]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[2]  Fred Cohen Managing Network Security: The Wireless Revolution , 2001 .

[3]  A. Goldsmith,et al.  Wireless network design for distributed control , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[4]  Gongjun Yan,et al.  Wireless Network Security: An Overview , 2013 .

[5]  Wang Chang Security in Wireless Network , 2006 .

[6]  Matthew P. Hottell,et al.  Predictors of Home-Based Wireless Security , 2006, WEIS.

[7]  William A. Arbaugh,et al.  Wireless Network Security and Interworking , 2006, Proceedings of the IEEE.