Security performance analysis in wireless LANs
The security protocol has been implemented within the network to ensure that the data sent is in integrity and security. Therefore, this experiment is to analyze the security protocol in performance of WLANs based on the IEEE 802.11 g/n standard. This experiment is conducted using a testbed to measu...
| Main Author: | Nurul Anis Anati, Saripudin |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/27106/ http://umpir.ump.edu.my/id/eprint/27106/1/Security%20performance%20analysis%20in%20wireless%20LANs.pdf |
Similar Items
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Secure open wireless LAN using point to point protocol
by: Guay, Wei Lin
Published: (2007)
by: Guay, Wei Lin
Published: (2007)
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
Performance of voice over IP (VoIP) over a wireless LAN (WLAN) for different audio/voice codecs
by: Mohd., Alias, et al.
Published: (2007)
by: Mohd., Alias, et al.
Published: (2007)
Real-time MPEG-4 transmission over wireless LAN
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
Secured wireless LAN using IPSec case study in Jabatan Agama Islam Selangor (JAIS) / Rozita Masiran
by: Masiran, Rozita
Published: (2006)
by: Masiran, Rozita
Published: (2006)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Visualizing Staff Information System (VSIS) / Wong Mook Lan
by: Wong , Mook Lan
Published: (2001)
by: Wong , Mook Lan
Published: (2001)
Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Local area network (LAN) cable tester using arduino
by: Norimah, Ba'ee
Published: (2014)
by: Norimah, Ba'ee
Published: (2014)
Performance analysis of RTS/CTS protocol over basic access in wireless networks: Study of protocol impact on performance in wireless networks
by: Kuruvilla, Mathew, et al.
Published: (2015)
by: Kuruvilla, Mathew, et al.
Published: (2015)
LAN monitoring and management tool (LMMT) / Muhammad Izwan Idris
by: Muhammad Izwan, Idris
Published: (2005)
by: Muhammad Izwan, Idris
Published: (2005)
Congestive Loss in Wireless Ad hoc Network: Network Performance Analysis
by: Nahar, H., et al.
Published: (2011)
by: Nahar, H., et al.
Published: (2011)
Performance study of the integration between wireless LAN and ATM LAN
by: Liew, Jing Hong
Published: (2005)
by: Liew, Jing Hong
Published: (2005)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
An interface of wireless network traffic analysis
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
Modeling and Performance Analysis of Throughput-Received Power Relationship for Indoor Wireless Mesh Network
by: Zakaria, Mohd Sharim, et al.
Published: (2010)
by: Zakaria, Mohd Sharim, et al.
Published: (2010)
Data mining in computer auditing / Hiromi Wong, Siew Lan and Valery Fred Lee
by: Hiromi , Wong, et al.
Published: (2004)
by: Hiromi , Wong, et al.
Published: (2004)
Analytical evaluation of unfairness problem in wireless LANs
by: Mohamedou, Ahmed, et al.
Published: (2010)
by: Mohamedou, Ahmed, et al.
Published: (2010)
Implementation and performance analysis of wireless Ad-hoc Mesh networks
by: Mok, Thomas Shao Chung
Published: (2024)
by: Mok, Thomas Shao Chung
Published: (2024)
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013)
by: Lo, Kelvin, Yir Siang
Published: (2013)
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
by: Khalaf, Osamah Ibrahem
Published: (2017)
by: Khalaf, Osamah Ibrahem
Published: (2017)
Performance studies of VoIP over ethernet LANs
by: Nizar, Kashif, et al.
Published: (2011)
by: Nizar, Kashif, et al.
Published: (2011)
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
Assessing Malacca wireless security implementation in government and private sector companies in – A case study
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008)
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008)
A Performance Investigation on IoT Enabled Intra-Vehicular Wireless Sensor Networks
by: Rahman, Md. Arafatur, et al.
Published: (2017)
by: Rahman, Md. Arafatur, et al.
Published: (2017)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Analysis of lightning-induced transient in 2.4 GHz wireless communication system
by: Ahmad, Mohd Riduan, et al.
Published: (2011)
by: Ahmad, Mohd Riduan, et al.
Published: (2011)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Performance improvement in end-to-end bandwidth estimation tool in wireless local area network (WLAN)
by: Kamarudin, Imran Edzereiq, et al.
Published: (2018)
by: Kamarudin, Imran Edzereiq, et al.
Published: (2018)
Intellectual property in education sector : analysis of copyright security issues and challenges
by: Abdul Jabar, Dzulnizar
Published: (2007)
by: Abdul Jabar, Dzulnizar
Published: (2007)
Analysis of IEEE 802.11b wireless security for university wireless LAN design
by: Chan,, FKL, et al.
Published: (2005)
by: Chan,, FKL, et al.
Published: (2005)
Tackling Intruders in Wireless Mesh Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Similar Items
-
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012) -
Secure open wireless LAN using point to point protocol
by: Guay, Wei Lin
Published: (2007) -
EAP Authentication Mechanism for Ad Hoc Wireless LAN
by: M.A.C., Bhakti, et al.
Published: (2010) -
Performance of voice over IP (VoIP) over a wireless LAN (WLAN) for different audio/voice codecs
by: Mohd., Alias, et al.
Published: (2007) -
Real-time MPEG-4 transmission over wireless LAN
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)