Mosul University
  • Register
  • Login
  • العربیة

AL-Rafidain Journal of Computer Sciences and Mathematics

Notice

As part of Open Journals’ initiatives, we create website for scholarly open access journals. If you are responsible for this journal and would like to know more about how to use the editorial system, please visit our website at https://ejournalplus.com or
send us an email to info@ejournalplus.com

We will contact you soon

  1. Home
  2. Volume 6, Issue 1
  3. Authors

Current Issue

By Issue

By Subject

Keyword Index

Author Index

Indexing Databases XML

About Journal

Aims and Scope

Editorial Board

Editorial Staff

Publication Ethics

Indexing and Abstracting

Related Links

Peer Review Process

News

Building Simple Protection for Wireless-Fidelity Network

    Manar Y. Ahmed Mohammed Z. Hasan

AL-Rafidain Journal of Computer Sciences and Mathematics, 2009, Volume 6, Issue 1, Pages 161-168
10.33899/csmj.2009.163775

  • Show Article
  • Download
  • Cite
  • Statistics
  • Share

Abstract

This paper describes some of the attacker utilize to disrupt wireless networks through MAC address, and then perform the simple protection through Traffic Protocol Authentication Module (TPAM). This module perform Challenge-Respond based on the hash part of MAC by using the hashing operation, this challenge will occur between the administrator, and the group of the customers through wireless network, and then generate and captured MAC address for all computers connect to wireless network detection unspecified MAC address, filtering it from the MAC address spooling according to protocol programmed by Visual Java#.Net. At the first stage the generation of MAC addresses must capture by many wireless networks tools such as AirJack, FakeAp and Wellenreiter, through analysis the traces. Then the programmer identifies the techniques which can be employed the used the capability to detect the anomaly MAC address, which also the user must alert the administrator of the wireless networks, or alert the others his/her friends in same workgroup. Wireless access points have large scale of the security problems, one of them are the suffering the unauthorized access and use. So the administrator or the wireless network should deal with his/her others groups to the specified generation of MAC address, and then registered the newest of the overall MAC address of the wireless network.
 
Keywords:
    Wireless-Fidelity Network Anomaly MAC address AirJack FakeAp Wellenreiter
  • PDF (258 K)
  • XML
(2009). Building Simple Protection for Wireless-Fidelity Network. AL-Rafidain Journal of Computer Sciences and Mathematics, 6(1), 161-168. doi: 10.33899/csmj.2009.163775
Manar Y. Ahmed; Mohammed Z. Hasan. "Building Simple Protection for Wireless-Fidelity Network". AL-Rafidain Journal of Computer Sciences and Mathematics, 6, 1, 2009, 161-168. doi: 10.33899/csmj.2009.163775
(2009). 'Building Simple Protection for Wireless-Fidelity Network', AL-Rafidain Journal of Computer Sciences and Mathematics, 6(1), pp. 161-168. doi: 10.33899/csmj.2009.163775
Building Simple Protection for Wireless-Fidelity Network. AL-Rafidain Journal of Computer Sciences and Mathematics, 2009; 6(1): 161-168. doi: 10.33899/csmj.2009.163775
  • RIS
  • EndNote
  • BibTeX
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Article View: 32
  • PDF Download: 48
  • LinkedIn
  • Twitter
  • Facebook
  • Google
  • Telegram
  • Home
  • Glossary
  • News
  • Aims and Scope
  • Privacy Policy
  • Sitemap
This journal is licensed under a Creative Commons Attribution 4.0 International (CC-BY 4.0)

Powered by eJournalPlus