Abstract
This paper is mainly based on providing security to the wireless networks through which devices like Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The protocols that are required to provide security to wireless networks can be implemented by creating a wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be designed especially for security purpose. This is done by following many tutorials to get a minimum basic knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of the data that is being exchanged. Data should be ensured as and then there will be a perfect implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to NS2 and implementation of that protocol by providing a wireless scenario.
Highlights
Bluetooth technology is the open standard for wireless connections with the backers mostly from the industries of mobile phones and computers
The following figures are the proofs to the demonstration
Security in wireless networks can be assured if security protocols are being constructed and implemented on the network
Summary
Bluetooth technology is the open standard for wireless connections with the backers mostly from the industries of mobile phones and computers. If a network gets an unauthorized access it can lead to cases like disclosure of sensitive information, modification of data, denial of service, illicit use of resources etc. If we take the case of a wired LAN, the attacker must physically connect some wires to the network to gain access to the resources and such protection is not available for a WLAN. This is because of remote access of any wireless networks. This led to a default option of turning off the security features temporarily and this creates a way for the attacker
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Network Security & Its Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.