THE REVIEW PAPER ON ENHANCEMENT OF WIRELESS SECRUITY
Keywords:
wireless, security mechanism, individuals, organizationsAbstract
most effective way to secure your wireless network from intruders is to encrypt, or scramble, communications over network. Most wireless routers, access points, & base stations have a built-in encryption mechanism. If our wireless router doesn’t have an encryption feature, consider getting one that does. Manufacturers often deliver wireless routers with encryption feature turned off. So we need to educate individuals & organizations on how to optimal use safety features. In this research we have enhanced wireless network by introducing triple layer security mechanism.
References
Sangita A. Jaju, Santosh S. Chowhan,” A Modified RSA Algorithm to Enhance Security for Digital Signature”, 978-1-4799-6908-1/15©2015 IEEE.
Ayman Tajeddine Ayman Kayssi Ali Chehab Imad Elhajj,” Authentication Schemes for Wireless Sensor Networks”, 17th IEEE Mediterranean Electrotechnical Conference, Beirut, Lebanon, 13-16 April 2014. 978-1-4799-2337-3/14©2014 IEEE.
Natasha Saini1 ,Nitin Pandey2, Ajeet Pal Singh3,” Enhancement Of Security Using Cryptographic Techniques”, 978-1-4673-7231-2/15©2015 IEEE.
Ashwak alabaichi, Adnan Ibrahem Salih, “Enhance Security of Advance Encryption Standard Algorithm Based on Key-dependent SBox”, ISBN: 978-1-4673-6832-2©2015 IEEE.
Kyung-Ah Shim,” A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks” IEEE Communications Survey & Tutorials, Vol., No., 2012, 1553-877X (c) 2015 IEEE.
Madhumita Panda, Atul Nag, “Plain Text Encryption Using AES, DES & SALSA20 by Java Based Bouncy Castle API on Windows & Linux”, 2015 Second International Conference on Advances in Computing & Communication Engineering, 978-1-4799-1734-1/15 © 2015 IEEE DOI 10.1109/ICACCE.2015.130.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.