Proposed System for Wireless Security

https://doi.org/10.24237/djes.2010.03206

Authors

  • Ali N. Hamied College of Engineering, University of Diyala, Iraq
  • Saad Qassim Fleh College of Engineering, University of Diyala, Iraq
  • Hussain F. Mahdi College of Engineering, University of Diyala, Iraq

Keywords:

Wireless Security, MAC Address, RSA Public-Key Cryptosystem

Abstract

Secured wireless computer networks are more important because signals are available through air and it’s easier to attacks from passive eavesdropping and active interfering. Now it was suffered from more problems, one from these problems is attach from the users and hackers. Therefore, wireless computer networks security is very important to solve or decrease this attach, a lot of researches were worked improved wireless security in this field but in different ways and different methods. This project had been represented how to prevent hackers’ accessing to the server, by using encryption to media access control “MAC address” from the two ends (server and user), using RSA public-key cryptosystem.

Downloads

Download data is not yet available.

References

B. Pioper, “Internetworking Technology Overview”, June 1999.

S. Sumathy and B. Kumar “Secure Key Exchange and Encryption Mechanism for Group Communication Wireless AD Hoc Networks” March 2010

http://en.wikipedia.org/wiki/Wireless.

http://www.firewall.cx/index.php .

http://www.dmasoftlab.com/cont/radman.

http://wiki.mikrotik.com/wiki/Initial_MAC_Winbox_Connection .

بروس بوزورث , الرموز والشفرات والحاسبات مقدمة الى امن المعلومات, ترجمة د. ميثم محمد زكري, 7. د. اديب حمدون سليمان, د. ستار بدر سدخان, بغداد 1989 .

Hellman, Martin E. “The Mathematics of Public-Key Cryptography ”, Scientific

American, vol. 241, no. 16 (August 1979).

Rivest R., Shamir A., and Adelman L. “A Method for Obtaining Digital Signatures and Public-Key Cryptography” Laboratory for Computer Science, MIT Technical Memo LCS/TM 82 (April 1977).

Published

2010-12-01

How to Cite

[1]
Ali N. Hamied, Saad Qassim Fleh, and Hussain F. Mahdi, “Proposed System for Wireless Security”, DJES, vol. 3, no. 2, pp. 70–78, Dec. 2010.