Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/323431
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialEnglish
dc.date.accessioned2021-04-29T08:01:31Z-
dc.date.available2021-04-29T08:01:31Z-
dc.identifier.urihttp://hdl.handle.net/10603/323431-
dc.description.abstractThe proposed model is designed after keeping the wireless security in mind for the WLAN networks, which are the rapidly growing and most used networks across the globe. The WLAN networks offer the high bandwidth and free access to the users now-a-days on the public places, which make them more vulnerable and prone to several security attacks. The open access WLAN networks can be easily used for data spoofing and replication attacks to steal the sensitive information from the important and target users. Also, these attacks can be launched to spoof the financial data in the form point of sales (POS), online payment gateways, credit card information, net banking credentials and several other forms of information. All these information types creates highly sensitive environment to the users, and can cause severe social or financial damage to its users, which must be prevented in order to provide the smooth access to the users. newlineIn order to prevent those threats, the proposed model focuses upon the node integrity mechanism to protect the WLAN nodes from altercation, replication or spoofing attacks. All, these attacks are performed over the resource unavailability based attacks, such as distributed denial of service (DDoS), denial of service (DoS) and blackhole attacks. These attacks are used to target the availability of the real node, and then the spoofed information is used to hijack the active connection. If the resource availability is ensured during the network communications, the chances of information spoofing decrease severely. Hence, these attacks must be prevented in order to protect the user information. newlineIn this thesis, the strong mechanism has been proposed against the attacks, which relies upon the authentication and overhead slicing. The authentication mechanism is based upon the paired-key, and performed in the layered mechanism, which eventually protect the node identity from undergoing the spoofing attacks. Additionally, the node availability is protected with the overhead slicing methodology
dc.format.extent162
dc.languageEnglish
dc.relationNA
dc.rightsuniversity
dc.titleEnhancement in Intrusion Detection Techniques in WLAN
dc.title.alternative
dc.creator.researcherSingh, Rupinder
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Information Systems
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideKumar, Dinesh
dc.publisher.placeBathinda
dc.publisher.universityGuru Kashi University
dc.publisher.institutionDepartment of Computer Applications
dc.date.registered2012
dc.date.completed2019
dc.date.awarded2019
dc.format.dimensionsA4
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Applications

Files in This Item:
File Description SizeFormat 
01 title page.pdfAttached File148.87 kBAdobe PDFView/Open
02 declaration.pdf552.02 kBAdobe PDFView/Open
05 list of publications.pdf150.28 kBAdobe PDFView/Open
08 chapter 1.pdf581.79 kBAdobe PDFView/Open
09 chapter 2.pdf399.04 kBAdobe PDFView/Open
10 chapter 3.pdf314.02 kBAdobe PDFView/Open
11 chapter 4.pdf1.23 MBAdobe PDFView/Open
12 chapter 5.pdf1.29 MBAdobe PDFView/Open
13 chapter 6.pdf1.21 MBAdobe PDFView/Open
14 chapter 7.pdf264.32 kBAdobe PDFView/Open
15 chapter 8 references.pdf368.3 kBAdobe PDFView/Open
80_recommendation.pdf161.54 kBAdobe PDFView/Open
preliminary section.pdf267.85 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: