Mutual Authentication Based Protocol Design for Securing Wireless Environments

Provided by: International Journal of Computer Networks and Wireless Communications (IJCNWC)
Topic: Security
Format: PDF
For organizations and individuals, wireless networks have become very common; almost all the laptops and mobile phones are wireless enabled. The portability and connectivity provided by wireless to the users has made the technology beneficial everywhere. With the benefits provided by wireless the security concerns and issues with wireless are also present, and are many. Wireless networks are relatively found easier to break into by hackers, and the wireless networks are also cracked to gain entry into the underlying wired networks. As a result, it becomes essential for enterprises to define effective wireless security policies that guard against unauthorized access to their sensitive resources.

Find By Topic