UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 12 | Issue 10 | October 2025

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 5
May-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1905851


Registration ID:
211976

Page Number

342-347

Share This Article


Jetir RMS

Title

Analytical Review of Security of Wireless Network

Abstract

The computers have become more and more sophisticated these days thus; it has become difficult to ensure security only by inspection and intuition . Standard methods of analyzing different aspects of the area have been developed; aiming to identify and apply key principles of the area. But the area of security analysis is constantly developing as new secure designs (and way of breaking into them) are invented. In many cases, systems are now so complex, and feature so much non-deterministic behavior that it is impossible to find an absolutely secure solution, and instead improvements to the problem and counter-measures to ensure security must be aimed at. The wireless network or popularly known as Wi-Fi is used most widely to connect various devices over the network. The communication over the wireless networks requires delivery of packets from the source or the sender to the receiver. Though wireless networks have got a large number of advantages over other networks as its economical, feasible, mobile etc., they are prone to large number of attacks due to security issues with the wireless channels. This paper presents how easily and with not that much technical knowledge one can penetrate into a secured wireless network easily and can perform various kinds of attacks from spoofing there IP to steals packets that are travelling over the network . It’s a matter of great concern as most of the institutes in any arena are using wireless networks to provide connectivity to there devices, hence it is extremely important to keep the data secure and to maintain the integrity and confidentiality of the data.

Key Words

Brute Force, Beacons, ESSID, BSSID, deauth, Channel

Cite This Article

"Analytical Review of Security of Wireless Network", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 5, page no.342-347, May-2019, Available :http://www.jetir.org/papers/JETIR1905851.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Analytical Review of Security of Wireless Network", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 5, page no. pp342-347, May-2019, Available at : http://www.jetir.org/papers/JETIR1905851.pdf

Publication Details

Published Paper ID: JETIR1905851
Registration ID: 211976
Published In: Volume 6 | Issue 5 | Year May-2019
DOI (Digital Object Identifier):
Page No: 342-347
Country: Lucknow, Uttar Pradesh, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002933

Print This Page

Current Call For Paper

Jetir RMS