CFP last date
20 December 2024
Reseach Article

Comparison of Cross Layer Techniques for Wireless Network Security for 802.11

Published on October 2013 by Priya Pradeep Bhirud
International Conference on Communication Technology
Foundation of Computer Science USA
ICCT - Number 5
October 2013
Authors: Priya Pradeep Bhirud
e72f0a21-abb5-4ba6-8c5f-c0b862a49095

Priya Pradeep Bhirud . Comparison of Cross Layer Techniques for Wireless Network Security for 802.11. International Conference on Communication Technology. ICCT, 5 (October 2013), 1-6.

@article{
author = { Priya Pradeep Bhirud },
title = { Comparison of Cross Layer Techniques for Wireless Network Security for 802.11 },
journal = { International Conference on Communication Technology },
issue_date = { October 2013 },
volume = { ICCT },
number = { 5 },
month = { October },
year = { 2013 },
issn = 0975-8887,
pages = { 1-6 },
numpages = 6,
url = { /proceedings/icct/number5/13673-1306/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication Technology
%A Priya Pradeep Bhirud
%T Comparison of Cross Layer Techniques for Wireless Network Security for 802.11
%J International Conference on Communication Technology
%@ 0975-8887
%V ICCT
%N 5
%P 1-6
%D 2013
%I International Journal of Computer Applications
Abstract

Wireless technology has been gaining popularity over some years. Adaptation of standard depends on ease of use and level of security it provides. . In this paper, we will study and compare Security techniques to detect attack in 802. 11 by fusing multi-layer metrics is presented. We will discuss advantages and limitations of techniques of cross layer approach for wireless network security. Cross-layer approach has gained interest in performance optimization due to their design advantages.

References
  1. Kyriakopoulos, Konstantinos G. ; Aparicio-Navarro, Francisco j. ; Parish, David j. "Fusing multi-layer Metrics for detecting security attacks in 802. 11 networks" Wireless Telecommunication Symposium 2011. Digital Object Identifier: 10. 1109/WTS. 2011. 5960832 Publication Year: 2011
  2. Aparicio-Navarro, Francisco J; Kyriakopoulos,. ; Parish Konstantinos G David J. - "An On-line Wireles Attack Detection System UsingMulti-layer Data Fusion". Measurements and Networking Proceedings (M&N), 2011dgital Object Identifiere10. 1109/IWMN. 2011. 6088478 Publication Year: 2011 , Page(s): 1 – 5
  3. K. Bicakci and B. Tavli, "Denial-of-service attacks and countermeasures in ieee 802. 11 wireless networks," Computer Standards & Interfaces, vol. 31, no. 5, pp. 931–941, 2009
  4. P. Bahl, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill, "Dair: A framework for managing enterprise wireless networks using desktop infrastructure," in Proceedings of the Fourth Workshop on Hot Topics in Networking (HotNets). ACM, 2005
  5. Y. Sheng, G. Chen, H. Yin, K. Tan, U. Deshpande, B. Vance, D. Kotz, A. Campbell, C. McDonald, T. Henderson, and J. Wright, "Map: A scalable monitoring system for dependable 802. 11 wireless networks, IEEE Wireless Communications, vol. 15(5), pp. 10–18, 2008.
  6. M. Raya, J. Hubaux, and I. Aad, "Domino: a system to detect greedy behavior in ieee 802. 11 hotspots," in Proceedings of the 2nd international conference on Mobile systems, applications, and services. ACM, 2004, pp. 84–97.
  7. Q. Chen and U. aicklin ,"Anomoly detection using the Demster Sheher Method" in Poceeding of 2006 International conference on Data Mining, DMIN 2006 2006,pp. pp. 232-240
  8. D. Yu and D. Frincke, "Alert confidence fusion in intrusion detection systems with extended dempster- shafer theory," in Proceedings of the 43rd annual Southeast regional conference-Volume 2. ACM, 2005, pp 142–147.
  9. Q. Chen and U. Aickelin, "Anomaly detection using the dempster-shafer method," in Proceedings of the 2006International Conference on Data Mining, DMIN 2006, pp. pp. 232–240.
  10. V. Chatzigiannakis, G. Androulidakis, K. Pelechrinis, S. Papavassiliou, and V. Maglaris, "Data fusion and algorithms for network anomaly detection: classification Third evaluation," in Networking and Services, 2007. ICNS. International Conference on. IEEE, 2008, p. 50.
  11. h. Wu,M. Siegel. R. stiefelhagen,and J. Yang,"Sensor fusion using Demster Shafer theory"in IEEE Instrumentation and Measerment Technology Conference. IEEE,21-23 May 2002
  12. G. Thamilarasu, S. Mishra, and R. Sridhar, "A cross- layer approach to detect jamming attacks in wireless ad hoc networks," in Military Communications Conference, 2006. MILCOM 2006. IEEE. IEEE, 2007, pp. 1–7.
  13. H. Wu, M. Siegel, R. Stiefelhagen, and J. Yang, "Sensor fusion using dempster-shafer theory," in IEEE Instrumentation and Measurement Technology Conference. IEEE, 21-23 May 2002.
  14. A survey on wireless security protocols (WEP, WPA and WPA2/802. 11i)Lashkari, A. H. ; Danesh, M. M. S. ; Samadi, B. Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on Digital Object Identifier: 10. 1109/ICCSIT. 2009. 5234856 Publication Year: 2009 , Page(s): 42- 52
  15. "Airpwn sourceforge website," Website.
Index Terms

Computer Science
Information Sciences

Keywords

Dempster-shafer Wireless Attacks Wi-fi Wep Wpa Tkip Psk Wireless Security