Academic literature on the topic 'WLAN'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WLAN.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "WLAN"

1

Durresi, Arjan, Mimoza Durresi, and Leonard Barolli. "Secure Authentication in Heterogeneous Wireless Networks." Mobile Information Systems 4, no. 2 (2008): 119–30. http://dx.doi.org/10.1155/2008/135848.

Full text
Abstract:
The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G – WLAN user authentication.
APA, Harvard, Vancouver, ISO, and other styles
2

Polgár, Zsolt Alfréd, Andrei Ciprian Hosu, Zsuzsanna Ilona Kiss, and Mihály Varga. "Vertical Handover Decision Algorithm for Heterogeneous Cellular-WLAN Networks." MACRo 2015 1, no. 1 (March 1, 2015): 1–12. http://dx.doi.org/10.1515/macro-2015-0001.

Full text
Abstract:
AbstractMulti-access and heterogeneous wireless communications are considered to be one of the solutions for providing generalized mobility, high system efficiency and improved user experience, which are important characteristics of the Next Generation Networks. This paper proposes a Vertical Handover (VHO) decision algorithm for heterogeneous network architectures which integrate both cellular networks and Wireless Local Area Networks (WLANs). The cellular-WLAN and WLAN-WLAN VHO decisions are taken based on parameters which characterize both the coverage and the traffic load of the WLANs. Computer simulations performed in complex scenarios show that the proposed algorithm ensures better performance compared to “classical” VHO decision algorithms.
APA, Harvard, Vancouver, ISO, and other styles
3

Khuder, Enaam F. "Performance Analysis of Industrial WLAN Based on EDCA Scheme Defined in IEEE802.11e." Tikrit Journal of Engineering Sciences 21, no. 1 (July 18, 2013): 24–34. http://dx.doi.org/10.25130/tjes.21.1.04.

Full text
Abstract:
In the last few years wireless local area network (WLAN) technology and products have grownunusually. This growth has encouraged many researchers to employ WLAN technology in differentapplication Areas. Recently, using IEEE 802.11 WLAN in industrial automation applications is attractiveand more interesting. However, the currently used medium access mechanism makes WLANs nondeterministicand hence not suitable for industrial real-time traffic. Legacy IEEE 802.11 WLANs wereinitially designed for best effort traffic only and did not provide any QoS support for this kind of traffic.The new amendment IEEE 802.11e standard was introduced and ratified in 2005. It defines the concept ofa Hybrid Co-ordination Function (HCF) at the MAC layer for medium access control. HCF is acombination of HCF Controlled Channel Access (HCCA) with parameterized quality of service (QoS)and Enhanced Distribution Channel Access (EDCA) with prioritized QoS. Enhanced DistributionChannel Access (EDCA) is an enhanced version of Distributed Coordination Function )DCF( mechanismused in the original IEEE 802.11 WLAN. This paper analyze the performance of the EDCA in anindustrial automation network with real-time requirements by means of a simulation with the networksimulator OPNET 11.5 and compares the results with the DCF in terms of latency and throughput invarious scenarios.
APA, Harvard, Vancouver, ISO, and other styles
4

Etta, Victor Ojong, Arif Sari, Agbotiname Lucky Imoize, Piyush Kumar Shukla, and Musah Alhassan. "Assessment and Test-case Study of Wi-Fi Security through the Wardriving Technique." Mobile Information Systems 2022 (June 30, 2022): 1–21. http://dx.doi.org/10.1155/2022/7936236.

Full text
Abstract:
This study aims to investigate Wireless Local Area Network (WLAN) within the context of its applicability as a 21st-century business tool and its survivability in a security threat-infested cyber landscape. WLAN security leverages the Wardriving technique deployed within geolocation to scan for WLAN density and explore the associated security mechanisms. Specifically, the study adopts two approaches; the first part reviews relevant research articles in electronic libraries and databases on WLAN security based on wardriving techniques. The other part comprises a measurement campaign conducted in a mid-sized city in North Cyprus. The field measurement aims to underscore the claims from the literature to find out how the security encryption technologies are used. In particular, the goal is to determine the availability of WLAN infrastructure and monitor how the security measures are implemented in Northern Cyprus. The main objective is to determine the security state of WLAN in Cyprus and examine how it can be generalized for related environments. In order to completely grasp the research issue posed in this study, data analyses from several perspectives are analyzed and examined critically. The wardriving approach has been used in this work to crawl wider regions for examination. This study was conducted with security findings drawn only from publicly accessible information emitted by each investigated wireless access point. The channel usage, Service Set IDentifier (SSID) security, the Encryption type (Open, WEP, WPA, WPA2, WPA3, and Mixed mode), WPS usage statistics, geographical locations, detailed security statistics described in Wigle CSV format, and vendor statistics are highlighted. Generally, results indicate that 21,345 WLANs were detected. From the detected WLANs, 23 (0.1 percent) used WEP encryption, 18 (0.08 percent) used WPA-TKIP encryption, 5,359 (25.1 percent) were unencrypted, and a clear majority of 9,139 (42.82 percent) used the more secure WPA2 encryption, while 13 networks (0.06 percent) used the latest WPA3 encryption technique. The results imply that WLAN security in Cyprus can be said to be moderate. Thus, this study adds to the expanding corpus of research on WLAN security and Wardriving to all parties in the wireless security ecosystem. The current study examines WLAN operations in North Cyprus while pointing to future research directions on Wireless LAN security mechanisms. Overall, the dataset from the wardriving experiment is novel and would serve future research exploration in the wireless security systems domain.
APA, Harvard, Vancouver, ISO, and other styles
5

Jardosh, Amit P., Konstantina Papagiannaki, Elizabeth M. Belding, Kevin C. Almeroth, Gianluca Iannaccone, and Bapi Vinnakota. "Green WLANs: On-Demand WLAN Infrastructures." Mobile Networks and Applications 14, no. 6 (December 9, 2008): 798–814. http://dx.doi.org/10.1007/s11036-008-0123-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zola, Enrica, and Francisco Barcelo-Arroyo. "Characterizing User Behavior in a European Academic WiFi Network." International Journal of Handheld Computing Research 4, no. 2 (April 2013): 55–68. http://dx.doi.org/10.4018/jhcr.2013040104.

Full text
Abstract:
Wireless local area networks (WLANs) are commonplace in many universities. Understanding the trends in the usage of these networks is becoming more important. Interesting results can be extracted about association patterns by analyzing WLAN traces from real scenarios. In this work, the library in the main campus of the Technical University of Catalonia (UPC) in Barcelona has been studied. Daily and weekly patterns of the WLAN connections are shown. The population accessing the network is mostly composed of infrequent users: half of the population accesses the WLAN once during each month. Many users associate to only one of the twelve possible access points, which means that, despite the widespread use of lightweight devices, many users are static. The results of this analysis provide general tools for characterizing campus-wide WLAN and a better understanding of usage and performance issues in a mature wireless network.
APA, Harvard, Vancouver, ISO, and other styles
7

Debnath, Sumon Kumar, Prodip Kumar Sarker, Md Manowarul Islam, and Ileas Pramanik. "Investigation and Evaluation of IEEE 802.11n WLANs Link Features Performance Under Single Host and Concurrent Communication." International Journal on AdHoc Networking Systems 11, no. 1 (January 31, 2021): 1–13. http://dx.doi.org/10.5121/ijans.2021.11101.

Full text
Abstract:
For an efficient design of wireless local-area networks (WLANs), the simulation tools are important to accurately estimate the IEEE 802.11n/ac link features for WLANs. However, this true simulation of network behavior is critical in designing high-performance WLANs. Through testing, analysis, and modeling of the proposed scheme repetitively, the design of the WLAN can be enhanced with a small budget before making its practical implementation. Many network simulation tools have been established to give solutions for this request and ns-3 is the most widely used tools among them by the research industry as an open-source network simulator. In this paper, we examine the various link features of the 802.11n WLANs under several conditions. We investigate the effects of 802.11n WLAN modulation and coding schemes (MCSs), 20MHz single channel or 40 MHz bonded channel, guard intervals (GI), frame aggregation, data encoding, number of antennas and their data rate, and link distance features of 802.11n WLAN in ns-3 when only a unique host connects with the access point (AP) and generates data traffic. Besides, the performance for an enterprise scenario proposed by the IEEE 802.11ax study group is evaluated when several hosts are simultaneously creating traffic with their associated APs. The results demonstrate that ns-3 support most of the link features of the 802.11n protocol with significant accuracy.
APA, Harvard, Vancouver, ISO, and other styles
8

Parashar, Vivek, Ramgopal Kashyap, Ali Rizwan, Dimitrios A. Karras, Gilder Cieza Altamirano, Ekta Dixit, and Fardin Ahmadi. "Aggregation-Based Dynamic Channel Bonding to Maximise the Performance of Wireless Local Area Networks (WLAN)." Wireless Communications and Mobile Computing 2022 (June 7, 2022): 1–11. http://dx.doi.org/10.1155/2022/4464447.

Full text
Abstract:
Channel bonding is considered by the IEEE 802.11ac amendment to improve wireless local area network (WLAN) performance. In this article, the channel bonding and aggregation method were proposed to increase wireless local area network performance (WLANs). It combines many channels (or lanes) to boost the capacity of modem traffic. Channel bonding is the combination of two neighbouring channels within a certain frequency band to increase wireless device throughput. Wi-Fi employs channel bonding, also known as Ethernet bonding. Channel bandwidth is equal to the uplink/downlink ratio multiplied by the operational capacity. A single 20 MHz channel is divided into two, four, or eight power channels. At 80 MHz, there are more main and smaller channels. Performance of short-range WLANs is determined through graph-based approach. The two-channel access techniques including channel bonding proposed for the IEEE 802.11ac amendment are analysed and contrasted. The novel channel sizing algorithm based on starvation threshold is proposed to expand the channel size to improve WLAN performance. Second-cycle throughput is estimated at 20 Mbps, much beyond the starvation threshold. Our test reveals access points (AP) 1, 2, and 4 have enough throughput. A four-AP WLAN with a 5-Mbps starvation threshold is presented. C160 = 1 since there is only one 160 MHz channel. MIR (3, 160 (a, a, a)) =0, indicating that AP 3’s predicted throughput is 0. The algorithm rejects the 160 MHz channel width since ST is larger than 0. The channel width in MHz is given by B =0,1 MIR. The MIR was intended to maximise simultaneous broadcasts in WLANs. The authors claim that aggregation with channel bonding outperforms so all WLAN APs should have a single-channel width. It usually outperforms fairness-based measures by 15% to 20%. Wi-Fi standards advise “channel bonding,” or using higher frequency channels. Later standards allow channel bonding by increasing bands and channel lengths. Wider channels enhance average WLAN AP throughput, but narrower channels reduce appetite. Finally, it is concluded that APs are more useful than STAs.
APA, Harvard, Vancouver, ISO, and other styles
9

Shin, Sungjin, Donghyuk Han, Hyoungjun Cho, and Jong-Moon Chung. "Improved Association and Disassociation Scheme for Enhanced WLAN Handover and VHO." Mobile Information Systems 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/4868479.

Full text
Abstract:
The number of mobile devices and wireless connections is significantly increasing. Among many wireless protocol types, wireless local area networks (WLANs) are expected to support a significant number of devices. Due to this reason, effective and efficient handover (HO) and vertical handover (VHO) support for WLAN mobile devices is important. A significant improvement in quality of service (QoS) can be obtained by reducing the association and disassociation interruption time for user equipment (UE) servicing real-time applications during WLAN HO and VHO operations. Based on this focus, this paper investigates the problem of using only the received signal strength indicator (RSSI) in HO and VHO decisions, which is what the current IEEE 802.11 based WLAN systems use. Experimental results presented in this paper demonstrate that only using the RSSI results in significant interruption time during HO to another WLAN access point (AP) or to a cellular base station during VHO. Therefore, in this paper, an improved association and disassociation scheme that can reduce the data interruption time (DIT) and improve the throughput performance is proposed.
APA, Harvard, Vancouver, ISO, and other styles
10

Park, Jaehyoung, Yonggang Kim, Gyungmin Kim, and Hyuk Lim. "Majority Voting-Based MAC Protocol for Exploiting Link-Layer Diversity in Wireless Networks." Sensors 21, no. 8 (April 12, 2021): 2706. http://dx.doi.org/10.3390/s21082706.

Full text
Abstract:
In wireless local area networks (WLANs), the effect of interference signals between neighboring nodes increases as the number of wireless nodes using limited radio frequency resources in a limited space increases, which can significantly degrade the reliability of data transmission. In high-density WLANs, there can be several neighboring access points (APs) that can receive uplink transmission from a station. In conventional medium access control (MAC) protocols, uplink data frames containing errors or transmitted from a non-associated station are discarded at APs. Alternatively, we propose a MAC protocol using redundant wireless links between neighboring APs and the non-associated stations. In the proposed MAC protocol, we consider a centralized WLAN with a control node that performs error corrections of erroneous uplink data frames via a majority voting algorithm-based link-layer diversity scheme using uplink data received from multiple APs to increase the reliability of data transmission. In addition, we propose an adaptive carrier sensing ranging mechanism to improve the uplink network throughput in the proposed centralized WLAN system. Further, we conduct simulation studies and software-defined radio-based experiments to evaluate the performance of the proposed MAC protocol in various WLAN scenarios.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "WLAN"

1

Memon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.

Full text
Abstract:

WLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN.

This report discusses the security issues of WLAN based on IEEE 802.11 standard, such type of networks are referred to as wifi network. WLAN is deployed as an extension of already existed wired LAN. Therefore it is necessary to provide the security of WLAN equals to Wired LAN.

We worked in a lab environment in order to configure the three different security solutions (WEP, WPA & WPA2 using IEEE 802.1X and RADIUS Server) on infrastructure mode for personnel and enterprise architecture of WLAN. For each security solution we used the backtrack as a security cracking tool, in order to break the WEP (64 and 128 bit long) security key of WLAN, make comparison between 64 and 128 bit long WEP key and also analyzed the different kind of attacks  and some drawbacks of using WEP security in WLAN. In the same way configure the WPA and WPA2 (using IEEE 802.1X and RADIUS Server) security solution in infrastructure mode of WLAN and use the same security cracking tool backtrack in order to break the security of the WLAN and analyze the different attacks on the network in these architecture and drawbacks of using WPA and WPA2 Security solutions. By using IEEE 802.1X and RADIUS Server we can improve the security of the enterprise network.

In the end we come with many conclusions and suggestions that will help in order to provide better security while deploying Wireless LAN.


Opponents: Ali Murtaza & Mansoor Ahmed
APA, Harvard, Vancouver, ISO, and other styles
2

Nyman, Pontus, and Stefan Sand. "Industrial WLAN." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20340.

Full text
Abstract:
WLAN i form av standarden IEEE 802.11 används inte i större utsträckning i industriell miljö. Vi undersöker hur pass protokollet kan användas för datakommunikation i sådan miljö med avseende på störningskänslighet och datorkraftsbehov, i form av en empirisk undersökning. Dessa undersökningar har utförts på en industri med de tre vanligaste standarderna IEEE 802.11b/g/n. Syftet med denna uppsats är att kontrollera vad som stör signalerna samt om den nyaste standarden 802.11n har något nytt som kan revolutionera inriktningen. Tester och undersökningar har visat att 802.11b och 802.11n är bäst när det gäller signalstyrka med störningskällor i omgivningen. 802.11n är överlägsen när det gäller hög överföringshastighet.
WLAN in the form of IEEE 802.11 is not used to any wide extent in the industrial environment. We examine how the protocol can be used for data communication in such an environment with regard to noise immunity and computing power needs, in the form of an empirical investigation. These studies have been conducted in an industrial environment with the three most commonly used standards IEEE 802.11b/g/n. The purpose of this paper is to understand what it is in the environment that disturbs signals and if the newest standard IEEE 802.11n has something new to add to the table that could revolutionize the focus. Tests and studies have shown that 802.11b and 802.11n is the best in terms of signal strength with interference in the environment. 802.11n is superior in terms of high bit rate.
APA, Harvard, Vancouver, ISO, and other styles
3

Nordqvist, Petter. "CAN-WLAN brygga." Thesis, Umeå universitet, Institutionen för tillämpad fysik och elektronik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-58130.

Full text
Abstract:
Rapporten täcker konstruktionen av en CAN-WLAN brygga från schemaritning ända till en nästintill konsumentfärdig produkt med inkapsling. Bryggan använder sig av mikroprocessorn AT90CAN128 tillsammans med WLAN-modulen WIZ610wi för att hantera kommunikation av CAN respektive WLAN. Bryggan är tänkt att monteras stationärt på en maskin/fordon som har en implementerad CAN-bus. Man kan sedan via smartphone eller bärbar dator avläsa informationen på CAN-bussen samt skicka ut CAN-paket. Allting sker via webbläsaren i den mobila enheten. Nätdel och kapsling har konstruerats av beställaren, Electrum. Resterande ingående delar har konstruerats från grunden och tas upp i denna rapport. Bryggan är generellt utformad för att klara alla typer av CAN-bussar med inställbara parametrar av hastighet, id-längd etc.
This report covers the construction of a CAN-WLAN bridge from a basic schematic all the way to a consumer ready product. The bridge uses the microprocessor AT90CAN128 and the WLAN module WIZ610wi which handles the communication of CAN and WLAN. The bridge is designed to be mounted stationary on a machine/vehicle which communicates through CAN. With a Smartphone or laptop you can then read the information on the CAN bus or send a CAN package. Everything is done through the web browser on the mobile device. Power supply and enclosure has been designed by the Electrum Automation. The remaining blocks have been designed from the ground up and is covered by this report. The bridge is generally designed to be able to communicate all types of CAN-busses with tunable parameters considering baud rate, id-length, etc.
APA, Harvard, Vancouver, ISO, and other styles
4

Yeo, Jihwang. "WLAN workload characterization." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/2825.

Full text
Abstract:
Thesis (M.S.) -- University of Maryland, College Park, 2005.
Thesis research directed by: Dept. of Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
5

Strand, Erlend Barstad. "WISA vs. WLAN: Co-existence challenges : - A tool for WLAN performance testing." Thesis, Norwegian University of Science and Technology, Department of Electronics and Telecommunications, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8789.

Full text
Abstract:

Wireless Interface for Sensors and Actuators (WISA) is ABB's proprietary wireless protocol for industrial automation on the factory floor. It operates in the 2.4GHz ISM band. Wireless Local Area Networks (WLANs), which typically occupy a fixed portion of the same 2.4GHz ISM band, are becoming more and more common on the factory floor. This raises a question of co-existence and how the performance of traffic over WLAN is affected when interfered by WISA. This report is a result of the development of a software tool and assembly of hardware that can aid the future testing of the effect WISA has on nearby WLANs. Together with the explanation of the usage of this software tool, this report will also investigate different arrangements of hardware components that are used to demonstrate and test the functionality of this new software tool. The software tool and the hardware components enable the measurement of important traffic metrics between two computers that communicate over a WLAN. The hardware components include a WISA Base Station (BS) that is configurable through the software tool and is used to cause interference on the WLAN.

APA, Harvard, Vancouver, ISO, and other styles
6

Andersson, Pierre, and Arvid Norlander. "Indoor Positioning Using WLAN." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-23461.

Full text
Abstract:
This report evaluates various methods that can be used to position a smartphone running the Android platform, without the use of any special hardware or infrastructure and in conditions where GPS is unavailable or unreliable; such as indoors. Furthermore, it covers the implementation of such a system with the use of a deterministic fingerprinting method that is reasonably device independent, a method which involves measuring a series of reference points, called fingerprints, in an area and using those to locate the user. The project was carried on behalf of Sigma, a Swedish software consulting company.
Denna rapport evaluerar olika metoder för att bestämma positionen av en smartphone som använder sig av Android-plattformen. Metoden skall inte använda sig av någon speciell hårdvara eller infrastruktur samt kunna hantera förhållanden där GPS är otillgängligt eller opålitligt, som till exempel inomhus. Den beskriver också implementation av ett sådant system som använder sig av en deterministisk fingerprinting-metod som någorlunda väl kan hantera enheter av olika modeller, en metod som innebär att man mäter upp en mängd med referenspunkter, kallade fingerprints, och använder dessa för att placera användaren. Projektet utfördes på uppdrag av Sigma, ett svenskt mjukvarukonsultbolag.
APA, Harvard, Vancouver, ISO, and other styles
7

Plaisner, Denis. "LTE-Advanced/WLAN testbed." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316419.

Full text
Abstract:
This thesis deals with the investigation and assessment of communication standards LTE-Advance and WiFi (IEEE 802.11n/ac). The EVM error parameter is examined for each standard. To work with different standards a universal workplace have been proposed (testbed). This universal workplace serves for adjusting transmitting and receiving means and for processing signals transmitted and interpreted. Matlab was chosen for this work, through which only control devices such as generators and analyzers from Rohde & Schwarz. This workplace also measures the coexistence of these standards. At the conclusion of this thesis, different coexistence scenarios were designed and evaluated through testbed results.
APA, Harvard, Vancouver, ISO, and other styles
8

Falade, Olumuyiwa, and Marcellus Botsio. "Mobile IP Handover for WLAN." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4903.

Full text
Abstract:

The past few years have seen great increases in the use of portable devices like laptops, palmtops, etc. This has also led to the dramatic increase demand on wireless local area networks (WLAN) due to the flexibility and ease of use that it offers. Mobile IP and handover are important issues to be considered as these devices move within and between different networks and still have to maintain connectivity. It is, therefore, imperative to ensure seamless mobile IP handover for these devices as they move about.

In this thesis we undertake a survey to describe the real processes involved in mobile IP handover in WLAN environment for different scenarios. Our work also identifies individual sources of delay during the handoff process, the sum total of which makes up the total latency. Other factors that could militate against the aim of having a seamless handoff in an inter-subnet network roaming were also considered as well as some proposed solutions. These factors are security, packet loss and triangle routing.

APA, Harvard, Vancouver, ISO, and other styles
9

Horndahl, Charles, and Kristian Maric. "WLAN : Oskyddad och okontrollerad datakommunikation." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-236.

Full text
Abstract:

This master’s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:

- What security weaknesses are present with the WLAN-technology and how can these be avoided?

- How does the wireless infrastructure in the Jonkoping region look like?

- Why do companies implement the WLAN-technology?

- Are the companies aware of the risks involved with WLAN?

We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures. The second step of the study was to scan the wireless networks in Jonkoping, Gnosjo and Nassjo in order to create a picture of the wireless infrastructure of the region. The third step of the study was to contact companies that we found in the second step for interviews to investigate their awareness of the technology and its weaknesses.

We found that WLANs and their security measures have weaknesses. The commonly used WEP encryption can quite easily be broken and can lure users into a false sense of security. The study shows that companies are aware of this weakness, but use the encryption be-cause it offers a good level of usability and security. It is a compromise between usability and security. Usability is one of the major factors for companies when implementing wireless networks, companies strive for mobility, easy access and ease of use, which the WLAN technology offers. This has lead to an extended wireless infrastructure in cities within the region where one, with ease, can find wireless networks outside buildings. We have noticed an increase in the security awareness as our empirical findings differ from earlier research conducted in other cities. When these studies are compared you can see a trend where the number of unprotected networks decreases. Our contribution to increased wireless security is a checklist of possible security measures to minimize the security threats.


Denna magisteruppsats undersöker tekniken och säkerhetsmedvetandet gällande trådlösa nätverk (WLAN). Då det tidigare uppmärksammats i media och teori att många trådlösa nätverk står oskyddade har detta skapat intresse att undersöka fenomenet i Jönköpingsregionen. Studien baseras på följande frågeställningar:

- Vilka säkerhetsluckor finns i WLAN och hur kan dessa undvikas?

- Hur ser WLAN-infrastrukturen ut i Jönköpingsregionen?

- Varför implementerar företag WLAN-tekniken?

- Är företag medvetna om riskerna med trådlösa nätverk?

För att skapa en helhetsbild har vi genomfört studien i tre steg varav vi, i det första steget, genomfört dataintrång i en kontrollerad miljö för att undersöka svagheterna med säkerhetsfunktionerna som används i trådlösa nätverk. I det andra steget undersökte vi med hjälp av bärbar dator trådlösa nätverk i Jönköping, Gnosjö och Nässjö. Detta för att skapa oss en uppfattning om hur WLAN-infrastrukturen ser ut i dagsläget. Steg tre innebar intervjuer med företag som vi funnit i samband med steg två rörande deras medvetenhet om tekniken och dess brister.

Teorin och vår empiri gav oss underlag att dra slutsatser utifrån våra frågeställningar. Vi fann att WLAN och dess säkerhetsfunktioner har vissa sårbarheter. Den mest förekommande krypteringstekniken, WEP, kan dekrypteras tämligen enkelt och kan vagga in användarna i en falsk säkerhet. Studien visar att företagen är medvetna om detta, men att det handlar om en medveten kompromiss mellan användarvänlighet och säkerhet. Användarvänligheten står till grund för varför företagen väljer att implementera den trådlösa tekniken. Företag eftersträvar mobilitet, smidighet och enkel access, vilket den trådlösa tekniken erbjuder. Detta har lett till en utökad trådlös infrastruktur i städer runtom i regionen där man med lätthet kan hitta trådlösa nätverk utanför byggnader. Vi har noterat ett ökat säkerhetsmedvetande då våra empiriska resultat skiljer sig något från tidigare undersökningar i andra städer. När dessa ställs mot varandra anar man en trend där antalet oskyddade trådlösa nätverk minskar. Vårt bidrag till ökad trådlös säkerhet är en checklista med möjliga åtgärder för att minimera säkerhetsriskerna.

APA, Harvard, Vancouver, ISO, and other styles
10

Elgström, John, and Daniel Teige. "Säkerhet i WLAN för myndigheter." Thesis, Örebro University, Swedish Business School at Örebro University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-4880.

Full text
Abstract:

I datornätverk blir användandet av WLAN (trådlösa nätverk) allt vanligare tack vare sin smidighet. Det är framförallt bekvämare att använda trådlösa nätverk då man slipper allt kablage och ofta är oberoende av var man befinner sig för att använda nätverket. Trådlösa nätverk är dock inte helt problemfria. Den främsta anledningen till detta är att informationen färdas genom radiovågor istället för genom kablade nätverk. Detta gör att WLAN är i riskzonen för avlyssning, där informationen kan utsättas för obehörig åtkomst om den inte är väl skyddad. Detta problem är grunden till denna uppsats.

Den här uppsatsen är en utredning som har gått ut på att ta fram generella riktlinjer för hur myndigheter skall uppnå god säkerhet i WLAN. Anledningen till att vi ville ta fram generella riktlinjer åt myndigheter var på grund av en rapport vi fann genomförd av krisberedskapsmyndigheten (KBM) 2008. Denna uppmärksammade att myndigheter ofta hoppar på nya tekniker utan att ha tillräckligt kunskap nog om dem, och att säkerhetstänket ofta får låg prioritet vid införandet av nya system. Ytterligare en artikel skapade av KBM från 2007, pekar på att myndigheter även har bristande säkerhet i sina DNS-system.

Eftersom vi koncentrerade oss på WLAN funderade vi då på, om nu säkerhetstänket får så låg prioritet och är så dåligt ställt i myndigheternas DNS-system, hur är det då ställt med säkerheten i WLAN?

Vi konstaterade efter att vi gjort förfrågningar till flera myndigheter, att ytterst få myndigheter hade något WLAN eller planerade att införskaffa det. Anledning till detta tror vi var att myndigheter var skeptiska till att det går att få ett WLAN säkert och hade bristande kunskap inom området.

Vi tog fram de generella riktlinjerna genom en kvalitativ metodansats, där vi genomfört litteraturstudier, undersökning av myndigheters policys samt intervju av expert på WLAN.

Resultatet visade att myndigheter behöver både administrativa säkerhetsåtgärder, tekniska säkerhetsåtgärder samt en specifik fysisk säkerhetsåtgärd för att uppnå god säkerhet i WLAN.

APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "WLAN"

1

Wireless local area network (WLAN) best practices guide. [Edmonton]: Stakeholder Technology Branch, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yong, Su-Khiong SK, Pengfei Xia, and Alberto Valdes-Garcia, eds. 60 GHz Technology for Gbps WLAN and WPAN. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470972946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Neeli, Prasad, and Prasad Anand, eds. WLAN systems and wireless IP for next generation communications. Boston, MA: Artech House, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Medosch, Armin. Freie Netze: Geschichte, Politik und Kultur offener WLAN-Netze. Hannover: Heise, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Immler, Christian. Windows 7 Pannenhilfe: WLAN, Internet & E-Mail, Fotos & Musik. Poing: Franzis, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

LTE, WIMAX, and WLAN network design, optimization and performance analysis. Chichester, West Sussex, U.K: Wiley, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohammadi, Behnam. A 5.8 GHz CMOS low noise amplifier for WLAN applications. Ottawa: National Library of Canada, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ma, Dennis Kwok-Leung. A subharmonically-injected quadrature LO generator for 17GHz WLAN applications. Ottawa: National Library of Canada, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Korowajczuk, Leonhard. LTE, WIMAX and WLAN Network Design, Optimization and Performance Analysis. Chichester, UK: John Wiley & Sons, Ltd, 2011. http://dx.doi.org/10.1002/9781119970460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

N, Plataniotis Konstantinos, and Venetsanopoulos, A. N. (Anastasios N.), 1941-, eds. WLAN positioning systems: Principles and applications in location-based services. Cambridge: Cambridge University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "WLAN"

1

Colhoun, O. "WLAN." In Springer Reference Medizin, 2514. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-48986-4_3329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Colhoun, O. "WLAN." In Lexikon der Medizinischen Laboratoriumsdiagnostik, 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-49054-9_3329-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Osterhage, Wolfgang W. "WLAN." In Sicherheitskonzepte in der mobilen Kommunikation, 7–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-57903-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Osterhage, Wolfgang W. "WLAN Architektur." In sicher & mobil, 45–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03083-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Osterhage, Wolfgang W. "WLAN Geräte." In sicher & mobil, 57–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03083-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shekhar, Shashi, and Hui Xiong. "WLAN Geolocation." In Encyclopedia of GIS, 1273. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_1496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shekhar, Shashi, and Hui Xiong. "WLAN Localization." In Encyclopedia of GIS, 1273. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_1497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Anamalamudi, Satish, Abdur Rashid Sangi, Mohammed Alkatheiri, Fahad T. Bin Muhaya, and Chang Liu. "5G-WLAN Security." In A Comprehensive Guide to 5G Security, 143–63. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Osterhage, Wolfgang W. "Grundzüge des WLAN." In sicher & mobil, 3–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03083-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schwenk, Jörg. "Drahtlose Netzwerke (WLAN)." In Sicherheit und Kryptographie im Internet, 91–110. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29260-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "WLAN"

1

Chen, Eason, Jeng Yuan Lai, Ming Zong Wang, Yu-Po Wang, and C. S. Hsiao. "Optimized Thermal Design for USB-WLAN Module." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-82247.

Full text
Abstract:
With the increasing demands of wireless network, WLAN modules are developed with various kinds of product patterns; USB type among all is popular for portability. In the market, most USB-WLAN products are made in small form factors that advantage to carry and use as daily portable electronic products. However, the compact size of USB-WLAN elevates the junction temperatures of every package in the module that potentially downgrade the reliability of product. This is a severe challenge for package and module designers that drive a necessity to characterize the thermal behavior from package level to module level to ensure the success of product development. A thermal study was therefore considered for an USB-WLAN module having Baseband, RF and PA packages mounted on a PCB. The characterizations for a commercial USB-WLAN module were conducted with a computational fluid dynamics (CFD) tool to cover the following factors: package design of Base-band and PA, power input level, PCB size and PCB design. The selections of Base-band and PA packages with better Theta_JB performance resulted in better thermal dissipation into PCB. Several power density levels were performed to observe the heat transfer interactions among packages. Different designs of PCB Cu layer, thermal via number and distribution were then investigated in module level simulations for package thermal enhancement. Finally a sample of USB-WLAN module was also built to examine the accuracy of modeling with good agreement.
APA, Harvard, Vancouver, ISO, and other styles
2

Nanda, Rohan, and P. Venkata Krishna. "D0M-WLAN." In the 6th International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2523514.2523575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"WLAN/WPAN." In 2006 IEEE International Solid-State Circuits Conference. Digest of Technical Papers. IEEE, 2006. http://dx.doi.org/10.1109/isscc.2006.1696191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chien, George, and Mototsugu Hamada. "WLAN/Bluetooth." In 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers. IEEE, 2007. http://dx.doi.org/10.1109/isscc.2007.373541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Behzad, Arya, and Tadashi Maeda. "WLAN/WPAN." In 2008 International Solid-State Circuits Conference - (ISSCC). IEEE, 2008. http://dx.doi.org/10.1109/isscc.2008.4523203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Krätzer, Christian, Jana Dittmann, Andreas Lang, and Tobias Kühne. "WLAN steganography." In Proceeding of the 8th workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1161366.1161371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ming-Chia Jiang, Jyh-Cheng Chen, and Yi-Wen Liu. "WLAN-centric authentication in integrated GPRS-WLAN networks." In 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484). IEEE, 2003. http://dx.doi.org/10.1109/vetecf.2003.1285928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

DebBarma, Diptanil. "Energy efficient RoF based centralized enterprise WLAN (CE-WLAN)." In IEEE EUROCON 2015 - International Conference on Computer as a Tool (EUROCON). IEEE, 2015. http://dx.doi.org/10.1109/eurocon.2015.7313695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Kimin, Yeonkeun Kim, Seokhyun Kim, Jinwoo Shin, Seungwon Shin, and Song Chong. "Just-in-time WLANs: On-demand interference-managed WLAN infrastructures." In IEEE INFOCOM 2016 - IEEE Conference on Computer Communications. IEEE, 2016. http://dx.doi.org/10.1109/infocom.2016.7524451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Packiaraj, D., M. Ramesh, A. T. Kalghatgi, and K. J. Vinoy. "Dual band(WLAN." In 2011 National Conference on Communications (NCC). IEEE, 2011. http://dx.doi.org/10.1109/ncc.2011.5734739.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "WLAN"

1

Kaippallimalil, J., R. Pazhyannur, and P. Yegani. Mapping Quality of Service (QoS) Procedures of Proxy Mobile IPv6 (PMIPv6) and WLAN. RFC Editor, June 2015. http://dx.doi.org/10.17487/rfc7561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thangavel, Kalavathi Devi, Sakthivel Palaniappan, and Sathish Kumar Shanmugam. Performance Analysis of VLSI Architecture of Viterbi Decoder in WLAN Using the Sleepy Keeper Technique. "Prof. Marin Drinov" Publishing House of Bulgarian Academy of Sciences, August 2020. http://dx.doi.org/10.7546/crabs.2020.08.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Housley, R., and T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, May 2004. http://dx.doi.org/10.17487/rfc3770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Housley, R., and T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, February 2006. http://dx.doi.org/10.17487/rfc4334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Krishnan, Michael N. Exploiting Spatial Channel Occupancy Information in WLANs. Fort Belvoir, VA: Defense Technical Information Center, May 2014. http://dx.doi.org/10.21236/ada605338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Masica, K. Recommended Practices Guide Securing WLANs using 802.11i. Office of Scientific and Technical Information (OSTI), October 2006. http://dx.doi.org/10.2172/1036841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Souppaya, M. P., and K. A. Scarfone. Guidelines for securing Wireless Local Area Networks (WLANs). Gaithersburg, MD: National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography