Sciweavers

JNW
2008

Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL

13 years 11 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for authentication, authorization and key distribution. Nevertheless, fresh security threats are emerging often to oust these new defense mechanisms. Further, many organizations based on superficial vendor literature, believe their wireless security is sufficient enough to prevent any unauthorized access. Having wide ranging options for security configurations, users are camouflaged into deep uncertainty. This volatile state of affairs has prevented many organizations from fully deploying WLANs for their secure communication needs, though WLANs may be cost effective and flexible. In this paper, we present a novel mechanism to detect and substantiate anomalies caused by both known and unknown security threa...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam
Added 13 Dec 2010
Updated 13 Dec 2010
Type Journal
Year 2008
Where JNW
Authors Elankayer Sithirasenan, Vallipuram Muthukkumarasamy
Comments (0)