Open Access Journal
ISSN : 2394 - 6849 (Online)
International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)
Open Access Journal
International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)
ISSN : 2394-6849 (Online)
Reference :
[1] 2010 2nd International Conference on Education Technology and Computer (ICETC). Wireless Hacking - A WiFi Hack by Cracking WEP. S Vinjosh Reddy, K SaiRamani, K Rijutha, Sk Mohammad Ali, CR. Pradeep Reddy
[2] Performance evaluation of the security in wireless local area networks (WiFi). Nada CHENDEB, Bachar El HASSAN and Hossam AFIFI
[3] Security Enhanced IEEE 802.1x Authentication Method for WLAN Mobile Router. Keun Young Park, Yong Soo Kim, Juho Kim
[4] 2009 International Conference on Signal Processing Systems, Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA), ARASH HABIBI LASHKARI, MASOOD MANSOORI, AMIR SEYED DANESH
[5] 2011 Panhellenic Conference on Informatics. Real-life paradigms of wireless network security attacks, I. P. Mavridis, A.-I. E. Androulakis, A. B. Ηalkias, Ph. Mylonas
[6] https://en.m.wikipedia.org/wiki/Router_(computing)- Router (computing)
[7] http://searchmobilecomputing.techtarget.com/definition/ wireless-router- Wireless Router
[8] https://en.m.wikipedia.org/wiki/IEEE_802.11 - IEEE 802.11
[9] http://whatismyipaddress.com/ppp-pppoe - What is PPP and PPPoE?
[10] http://searchwindevelopment.techtarget.com/definition /static-IP-address-dynamic-IP-address-static IP address/dynamic IP addres
[11] http://cecs.wright.edu/~pmateti/InternetSecurity/Lectur es/WirelessHacks/Mateti-WirelessHacks.htm-Hacking Techniques in Wireless Networks
[12] https://www.techopedia.com/definition/18091/bruteforce-attack - Brute Force Attack
[13] http://smallbusiness.chron.com/difference-betweenhardware-firewall-software-firewall-65471.html -The Difference Between a Hardware Firewall and a Software Firewall
[14] http://www.howtogeek.com/167783/htg-explains-thedifference-between-wep-wpa-and-wpa2-wirelessencryption-and-why-it-matters/ - HTG Explains: The Difference Between WEP, WPA, and WPA2 Wireless Encryption (and Why It Matters)
[15] http://www.howtogeek.com/204458/why-youshouldn%E2%80%99t-use-mac-address-filtering-on-yourwi-fi-router/-Why You Shouldn’t Use MAC Address Filtering On Your Wi-Fi Router
[16] https://en.m.wikipedia.org/wiki/Blacklist_(computing) - Blacklist (computing)
[17] International Journal of Advanced Research in Computer Science and Software Engineering, Ethical Hacking: A Security Technique, Sonal Beniwal, Sneha
[18] Hacking Techniques in Wireless Networks, Prabhaker Mateti, Department of Computer Science and Engineering, Wright State University, Dayton, Ohio 45435-0001
[19] http://www.rootsh3ll.com/2015/10/rwsps-automatedwifi-wep-wpa2-wps-cracking-ch4/-RWSPS: Automated WiFi Cracking [ch4]
[20] http://himanshunegi.in/hack-wifi-password-wifite/ - How to Hack WiFi Password? Cracking WEP, WPA/WPA2, WPS with Wifite!
[21] http://www.whoisonmywifi.com/How_To_Make_A_ Wireless_Network_Secure.pdf - How to Make a Wireless Network Secure
[22] Hacking Techniques in Wireless Networks, Prabhaker Mateti, Department of Computer Science and Engineering, Wright State University, Dayton, Ohio
[23] 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) WLAN Security System based on the 802.1 and AES, Dushuqin, Qin Yi
[24] Securing Wi-Fi Networks, Kjell J. Hole, Erlend Dyrnes, Per Thorsheim