The Security Experience of Wireless Local Area Network at Ningbo University

Article Preview

Abstract:

The network revolution has dramatically changed the way individuals communicate and conduct business. In the whole network system, WLAN is the most easily linked to the users. The diversity of WLAN communication makes it faced with various information security threats. This paper provides necessary and sufficient conditions for wireless network to lead to an increased security level. Concerns for WLAN security and confidentiality in a university environment were expressed in the paper. A number of recommendations are provided to initiate and promote WLAN security. The contribution of this paper is divided into three parts. Firstly, it introduces the overall network and the WLAN of Ningbo University in general. Secondly, it analyzes different WLAN protocol defects and the information security threats and attacks known in the campus LAN. Thirdly, it provides WLAN communication security precautions and the strategies adopted by our university for solution from the aspects of technique and management respectively.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 488-489)

Pages:

1603-1608

Citation:

Online since:

March 2012

Authors:

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] G. K. W. Wong and L. D. Fife, in: Proc. of the 34th Annual ACM SIGUCCS Conf. on User Services. ACM Press, New York (2006), p.424

Google Scholar

[2] Z. S. Barka, E. E. Mohamed, and K. Hayawi, in: Proc. ACM Symp. Int. Wireless Comm. & Mobile Comput. Conf. , ACM Press, New York (2006), p.1295

Google Scholar

[3] M. Masuya, T. Yamanoue, and S. Kubota, in: Proc. of the 34th Annual ACM SIGUCCS Conf. on User Services. ACM Press, New York (2006), p.225

Google Scholar

[4] F. gang and J. Baochuan, Network Security Tech. & App., vol. 7 (2007), p.36

Google Scholar

[5] Y. Rezgui and A. Marks, Computers & Security, vol. 27 (2008), p.241

Google Scholar

[6] L. A. Gordon, M. P. Loeb, and W. Lucyshyn, Journal of Accounting & Public Policy, vol. 22(2003), p.461

Google Scholar

[7] J. S. Park and D. Dicoi, IEEE Internet Computing, vol. 7 (2003), p.60

Google Scholar

[8] J. Yixin, L. Pchung, Y. Phao and C. Pzhen, Wireless Comm. & Mobile Comput., vol. 8 (2008), p.101

Google Scholar

[9] S. Chandramathi, K. V. Arunkumar, S. Deirarayan, P. S. Kumar and K. Vaithiyanathan, Int. J. Info. & Comm. Tech., vol. 1 (2008), p.437

Google Scholar