New technique for protecting transmitted data via WLAN
Keywords:
information, interceptions, networking, transmission, wirelessAbstract
The proposed work is a new technique for protecting the transmitted data via WLAN from eavesdropping and illegal interceptors. The main aim of this technique is to control the transmitted packets in order to minimize risks level which may be caused by probable attacks. Moreover, this technique assumes that the transmitted data in the training phase was used to train the system to be adaptable and immune against different attacks which may be caused within several circumstances. This proposed research covers all the possibilities using the framework of fuzzy theory for all risks levels and the size of every packet from low to high.
Downloads
References
Chandra, P., & Lide, D. (2011). Wi-Fi Telephony: Challenges and solutions for voice over WLANs. Elsevier.
Changping, Z., Xingsong, D., Jia, Z., Lei, L. I., Xiaoyang, Z., Hongzhen, Y. U., & Zhang, S. (2010). Performance analysis of wireless local area networks (WLAN) in a coal-mine tunnel environment. Mining Science and Technology (China), 20(4), 629-634. https://doi.org/10.1016/S1674-5264(09)60257-X
Fallah, Y. P., & Alnuweiri, H. (2007). Hybrid polling and contention access scheduling in IEEE 802.11 e WLANs. Journal of Parallel and Distributed Computing, 67(2), 242-256. https://doi.org/10.1016/j.jpdc.2006.07.003
Finneran, M. F. (2011). Voice over WLANS: The complete guide. Elsevier.
Garroppo, R. G., Nencioni, G., Scutellà, M. G., & Tavanti, L. (2016). Robust optimisation of green wireless LANs under rate uncertainty and user mobility. Electronic Notes in Discrete Mathematics, 52, 221-228. https://doi.org/10.1016/j.endm.2016.03.029
Jha, S., & Ali, S. (2014, September). Mobile agent based architecture to prevent session hijacking attacks in IEEE 802.11 WLAN. In 2014 International Conference on Computer and Communication Technology (ICCCT) (pp. 227-232). IEEE. https://doi.org/10.1109/ICCCT.2014.7001497
Joseph, W., Pareit, D., Vermeeren, G., Naudts, D., Verloock, L., Martens, L., & Moerman, I. (2013). Determination of the duty cycle of WLAN for realistic radio frequency electromagnetic field exposure assessment. Progress in Biophysics and Molecular Biology, 111(1), 30-36. https://doi.org/10.1016/j.pbiomolbio.2012.10.002
Mourad, A., Muhammad, S., Al Kalaa, M. O., Refai, H. H., & Hoeher, P. A. (2017). On the performance of WLAN and Bluetooth for in-car infotainment systems. Vehicular Communications, 10, 1-12. https://doi.org/10.1016/j.vehcom.2017.08.001
Musbah, E. M. M., Bilal, K. H., & Mustafa, N. (2015). Comparison of QoS performance over WLAN, VoIP4 and VoIP6. International Research Journal of Management, IT and Social Sciences, 2(11), 29-37.
Sahu, B., Chakrabarti, S., & Maskara, S. L. (2010). An improved residual frequency offset estimation scheme for OFDM based WLAN systems. Digital Signal Processing, 20(2), 454-461. https://doi.org/10.1016/j.dsp.2009.06.017
Soungalo, T., Renfa, L., Fanzi, Z., & Waita, H. N. (2012). Performance analysis of interworking between WLAN and 3G networks based on three approaches. Procedia Engineering, 29, 1126-1132. https://doi.org/10.1016/j.proeng.2012.01.099
Published
How to Cite
Issue
Section
Articles published in the International Research Journal of Management, IT and Social sciences (IRJMIS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IRJMIS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IRJMIS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IRJMIS volumes 7 onwards. Please read about the copyright notices for previous volumes under Journal History.