Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/323431
Title: Enhancement in Intrusion Detection Techniques in WLAN
Researcher: Singh, Rupinder
Guide(s): Kumar, Dinesh
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Guru Kashi University
Completed Date: 2019
Abstract: The proposed model is designed after keeping the wireless security in mind for the WLAN networks, which are the rapidly growing and most used networks across the globe. The WLAN networks offer the high bandwidth and free access to the users now-a-days on the public places, which make them more vulnerable and prone to several security attacks. The open access WLAN networks can be easily used for data spoofing and replication attacks to steal the sensitive information from the important and target users. Also, these attacks can be launched to spoof the financial data in the form point of sales (POS), online payment gateways, credit card information, net banking credentials and several other forms of information. All these information types creates highly sensitive environment to the users, and can cause severe social or financial damage to its users, which must be prevented in order to provide the smooth access to the users. newlineIn order to prevent those threats, the proposed model focuses upon the node integrity mechanism to protect the WLAN nodes from altercation, replication or spoofing attacks. All, these attacks are performed over the resource unavailability based attacks, such as distributed denial of service (DDoS), denial of service (DoS) and blackhole attacks. These attacks are used to target the availability of the real node, and then the spoofed information is used to hijack the active connection. If the resource availability is ensured during the network communications, the chances of information spoofing decrease severely. Hence, these attacks must be prevented in order to protect the user information. newlineIn this thesis, the strong mechanism has been proposed against the attacks, which relies upon the authentication and overhead slicing. The authentication mechanism is based upon the paired-key, and performed in the layered mechanism, which eventually protect the node identity from undergoing the spoofing attacks. Additionally, the node availability is protected with the overhead slicing methodology
Pagination: 162
URI: http://hdl.handle.net/10603/323431
Appears in Departments:Department of Computer Applications

Files in This Item:
File Description SizeFormat 
01 title page.pdfAttached File148.87 kBAdobe PDFView/Open
02 declaration.pdf552.02 kBAdobe PDFView/Open
05 list of publications.pdf150.28 kBAdobe PDFView/Open
08 chapter 1.pdf581.79 kBAdobe PDFView/Open
09 chapter 2.pdf399.04 kBAdobe PDFView/Open
10 chapter 3.pdf314.02 kBAdobe PDFView/Open
11 chapter 4.pdf1.23 MBAdobe PDFView/Open
12 chapter 5.pdf1.29 MBAdobe PDFView/Open
13 chapter 6.pdf1.21 MBAdobe PDFView/Open
14 chapter 7.pdf264.32 kBAdobe PDFView/Open
15 chapter 8 references.pdf368.3 kBAdobe PDFView/Open
80_recommendation.pdf161.54 kBAdobe PDFView/Open
preliminary section.pdf267.85 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: