Abstract

This paper is mainly based on providing security to the wireless networks through which devices like Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The protocols that are required to provide security to wireless networks can be implemented by creating a wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be designed especially for security purpose. This is done by following many tutorials to get a minimum basic knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of the data that is being exchanged. Data should be ensured as and then there will be a perfect implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to NS2 and implementation of that protocol by providing a wireless scenario.

Highlights

  • Bluetooth technology is the open standard for wireless connections with the backers mostly from the industries of mobile phones and computers

  • The following figures are the proofs to the demonstration

  • Security in wireless networks can be assured if security protocols are being constructed and implemented on the network

Read more

Summary

INTRODUCTION

Bluetooth technology is the open standard for wireless connections with the backers mostly from the industries of mobile phones and computers. If a network gets an unauthorized access it can lead to cases like disclosure of sensitive information, modification of data, denial of service, illicit use of resources etc. If we take the case of a wired LAN, the attacker must physically connect some wires to the network to gain access to the resources and such protection is not available for a WLAN. This is because of remote access of any wireless networks. This led to a default option of turning off the security features temporarily and this creates a way for the attacker

NEED FOR WIRELESS SECURITY
Background
The Threat Situation
Introduction to NS2
Installation of NS2
Problem with NS2
Approach to NS2
Algorithm To Add A Protocol to NS2
PROGRAM CODE
DEMONSTRATION & RESULTS
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.