Implementation of a Security Protocol for Bluetooth and WI-FI

  • U P
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

This paper is mainly based on providing security to the wireless networks through which devices like Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The protocols that are required to provide security to wireless networks can be implemented by creating a wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be designed especially for security purpose. This is done by following many tutorials to get a minimum basic knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of the data that is being exchanged. Data should be ensured as and then there will be a perfect implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to NS2 and implementation of that protocol by providing a wireless scenario.

Cite

CITATION STYLE

APA

U, P. K. (2013). Implementation of a Security Protocol for Bluetooth and WI-FI. International Journal of Network Security & Its Applications, 5(3), 67–83. https://doi.org/10.5121/ijnsa.2013.5307

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free