American Journal of Software Engineering and Applications

| Peer-Reviewed |

The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard

Received: 14 September 2016    Accepted: 23 September 2016    Published: 21 August 2017
Views:       Downloads:

Share This Article

Abstract

Network attacks are one of the most complicated and major problems in the web. There is a strong need for promoting web security, particularly in the wireless network domain. In this paper, the network security based on the IEEE 802.11 standard has been promoted and discussed. We present our idea on the integration of both access points and a proxy as well as the AES algorithm to provide the network security to a certain degree that the attacker cannot have influence on the network easily.

DOI 10.11648/j.ajsea.s.2016050301.18
Published in American Journal of Software Engineering and Applications (Volume 5, Issue 3-1, May 2016)

This article belongs to the Special Issue Advances in Computer Science and Information Technology in Developing Countries

Page(s) 34-39
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Network Security, IEEE 802.11, Wireless

References
[1] R. Bhoyar, M. Ghonge, and S. Gupta, "Comparative Study on IEEE Standard of Wireless LAN/Wi-Fi 802.11 a/b/g/n," International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE), vol. 2, 2013.
[2] J. Soryal, I. M. Perera, I. Darwish, N. Fazio, R. Gennaro, and T. Saadawi, Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption, 2014.
[3] A. Garg, "IEEE 802.11: Security," ed, 2010.
[4] Y. E. H. El Idrissi, N. Zahid, and M. Jedra, "A New EAP Authentication Method for IEEE 802.11 Wireless," IJCSNS, vol. 11, p. 1, 2011.
[5] P. J. F. Ruiz, F. B. Hidalgo, J. Santa Lozano, and A. F. Skarmeta, "Deploying ITS Scenarios Providing Security and Mobility Services Based on IEEE 802.11 p Technology," InTech, Feb, 2013.
[6] P. K. DEVI, "SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW."
[7] M. Mina, A. G. Abdul Azim, and S. Shamala, "Design and implementation of a lightweight security model to prevent IEEE 802.11 Wireless DoS attacks," EURASIP Journal on Wireless Communications and Networking, vol. 2011, 2011.
[8] U. Kumar and S. Gambhir, "A Literature Review of Security Threats to Wireless Networks," International Journal of Future Generation Communication & Networking, vol. 7, 2014.
[9] A. Reinhardt, D. Seither, A. König, R. Steinmetz, and M. Hollick, "Protecting IEEE 802.11 s wireless mesh networks against insider attacks," in LCN, 2012, pp. 224-227.
[10] S. Boyer, J. M. Robert, H. Otrok, and C. Rousseau, "An adaptive tit–for–tat strategy for IEEE 802.11 CSMA/CA protocol," International Journal of Security and Networks, vol. 7, pp. 95-106, 2012.
[11] A. Tsitroulis, D. Lampoudis, and E. Tsekleves, "Exposing WPA2 security protocol vulnerabilities," International Journal of Information and Computer Security, vol. 6, pp. 93-107, 2014.
[12] G. Kaur and N. Madaan, "A Comparative Study of AES Encryption Decryption," International Journal, 2014.
[13] M. Mina, A. G. Abdul Azim, and S. Shamala, "Design of cyberwar laboratory exercises to implement common security attacks against IEEE 802.11 wireless networks," Journal of Computer Systems, Networks, and Communications, vol. 2010, 2011.
[14] T. Farooq, D. Jones, and M. Merabti, "MAC Layer DoS Attacks in IEEE 802.11 Networks," in The 11th Annual Conference on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2010), Liverpool, UK, 2010.
[15] L. Kurup, M. V. Shah, and M. D. Shah, "Comparative Study of Attacks on Security Protocols," identity, vol. 3, 2014.
[16] J. P. de Carvalho, H. Veiga, N. Marques, C. R. Pacheco, and A. Reis, "Laboratory performance of Wi-Fi IEEE 802.11 B, G WPA2 point-to-point links: a case study," in Proceedings of the World Congress on Engineering, 2011.
Author Information
  • Computer and IT Department, University of Applied Science and Technology, Talesh, Guilan, Iran

  • Computer and IT Department, University of Applied Science and Technology, Talesh, Guilan, Iran

Cite This Article
  • APA Style

    Zeinab Heidari, Morteza Elme Maryan. (2017). The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard. American Journal of Software Engineering and Applications, 5(3-1), 34-39. https://doi.org/10.11648/j.ajsea.s.2016050301.18

    Copy | Download

    ACS Style

    Zeinab Heidari; Morteza Elme Maryan. The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard. Am. J. Softw. Eng. Appl. 2017, 5(3-1), 34-39. doi: 10.11648/j.ajsea.s.2016050301.18

    Copy | Download

    AMA Style

    Zeinab Heidari, Morteza Elme Maryan. The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard. Am J Softw Eng Appl. 2017;5(3-1):34-39. doi: 10.11648/j.ajsea.s.2016050301.18

    Copy | Download

  • @article{10.11648/j.ajsea.s.2016050301.18,
      author = {Zeinab Heidari and Morteza Elme Maryan},
      title = {The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard},
      journal = {American Journal of Software Engineering and Applications},
      volume = {5},
      number = {3-1},
      pages = {34-39},
      doi = {10.11648/j.ajsea.s.2016050301.18},
      url = {https://doi.org/10.11648/j.ajsea.s.2016050301.18},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ajsea.s.2016050301.18},
      abstract = {Network attacks are one of the most complicated and major problems in the web. There is a strong need for promoting web security, particularly in the wireless network domain. In this paper, the network security based on the IEEE 802.11 standard has been promoted and discussed. We present our idea on the integration of both access points and a proxy as well as the AES algorithm to provide the network security to a certain degree that the attacker cannot have influence on the network easily.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - The Integration of the Proxy Server Pattern and Access Point in Promoting the Security with IEEE 802.11 Standard
    AU  - Zeinab Heidari
    AU  - Morteza Elme Maryan
    Y1  - 2017/08/21
    PY  - 2017
    N1  - https://doi.org/10.11648/j.ajsea.s.2016050301.18
    DO  - 10.11648/j.ajsea.s.2016050301.18
    T2  - American Journal of Software Engineering and Applications
    JF  - American Journal of Software Engineering and Applications
    JO  - American Journal of Software Engineering and Applications
    SP  - 34
    EP  - 39
    PB  - Science Publishing Group
    SN  - 2327-249X
    UR  - https://doi.org/10.11648/j.ajsea.s.2016050301.18
    AB  - Network attacks are one of the most complicated and major problems in the web. There is a strong need for promoting web security, particularly in the wireless network domain. In this paper, the network security based on the IEEE 802.11 standard has been promoted and discussed. We present our idea on the integration of both access points and a proxy as well as the AES algorithm to provide the network security to a certain degree that the attacker cannot have influence on the network easily.
    VL  - 5
    IS  - 3-1
    ER  - 

    Copy | Download

  • Sections