Open Access Open Access  Restricted Access Subscription or Fee Access

Survey on Network Security in WI-FI Technology

S. Kannadhasan, R. Suresh


Wi-Fi is an ellipsis for Wireless Fidelity encompasses a number of standards that enable computers and other devices to connect wirelessly to local area networks and also to the internet through (WISP) Wireless Internet Service Providers. Wireless Data Transmissions including various applications such as Packet Radio, Wireless Local Area Networks, Wireless Local Loop, Free Space Optics, Satellite Transmission etc..Wi-Fi uses both single carrier Direct Sequence Spread Spectrum radio technology (DSSS) and multi-carrier Orthogonal Frequency Division Multiplexing radio technology (OFDM). Two communication protocol standards such as Bluetooth and IEEE 802.11 (Wi-Fi) are classified a physical layer and a MAC layer for wireless communications within a short range (from a few meters up to 100 meters) with low power consumption (from less than 1 mW up to 100 mW). Bluetooth is slanting to connecting close devices, plateful as a proxy for cables, while Wi-Fi is leaning towards computer-to-computer connections, as a conservatory of before exchange for cabled LANs. Wi-Fi hysterics in a family of principles urban under the IEEE. The 802.11 standard is a relation of specifications for wireless local area networks (WLAN’s). The 802.11 standard addresses communication between devices over infrared and radio frequency (RF) transmissions. Wireless networks are different than a physical-wired network. To join a physical network, one must have physical access to the network in order to connect to it. Therefore, physical security plays a significant role in authenticating users in physical network. Wireless networks, on the other hand, do not stay neatly contained within the walls of a building—who’s allowed on a WLAN is handled through authentication. The radio waves appear in the street where transmissions from wireless LANs can be monitored by an eavesdropper with suitable available technology. This is called Eavesdropping in Wi-Fi. This can be avoided by allowing the devices trying to connect only through authentication. In this paper we offer an overview of these popular wireless communication standards, comparing their main features and behaviors in terms of various metrics.


LAN Architecture, Authentication, Security Model, Eavesdropping

Full Text:



A. Fuggetta, G.P. Picco, and G. Vigna. Understanding Code Mobility. IEEE Transaction on Software Engineering, 24(5), May 1998.

V. A. Phan and A. Karmouch. Mobile Software Agents: An Overview. IEEE CommunicationMagazine, 31(7):26–37, July 1998

K. Rothermel and R.Popescu-Zeletin Eds.,. Mobile Agents. Lecture Notes in Comp. Science, LNCS1219, 1997.

D. Lange and M. Oshima. Seven good reasons for mobile agents. Communications of the ACM, 3(42):88–89, March 1999.

D.M. Chess, C.G. Harrison, and A. Kershenbaum. Mobile Agents: Are they a Good Idea? Technical Report RC19887,

IBM T.J. Watson Research Center, March 1995 A. Puliafito and O. Tomarchio. Using Mobile Agents to implement flexible Network Management strategies. Computer Communication Journal, 23(8):708–719, April 2000.

P.J. Marques, L.M. Silva, and J.G. Silva. Security mechanisms for using mobile agent in electronic commerce. In IEEE Symposium on Reliable Distributed Systems, Lausanne, Switzerland, October 1999. ICACC 11


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.