Abstract: The purpose of this study is to review contemporary wireless network protocols and areas that affect the ability of wireless fidelity (Wi-Fi) technology to secure data transmitted over wireless networks. The research approach takes the form of a case study, in collating the methods used by existing protocols in the implementation of wireless Security Trust Models within their networks Wireless protected access Wi-Fi protected access; version 2 (WPA2) protocol has provided a more secure means for securing wireless networks but has only provided stronger encryption as it has a longer key which takes longer to decipher. In the current world, the high value objects such as ipads, laptops, are prone to the theft and are required to be monitored to ensure safety. Monitoring the objects within a short distance by the use of a wireless security system is implemented with the help of modules which are capable of communicating with each other.
Keywords: wifi, wimax, wireless network equipments, wireless networks attacks.
Title: AN OPTIMIZATION OF WIRELESS NETWORK SECURITY SYSTEM
Author: Nandhini P, Dr. B. Jagadhesan, Anusuja D
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals