COMPREHENSIVE ANALYSIS OF THE SECURITY OF WIRELESS NETWORKS NRNU MEPHI

  • Сергей Владимирович Зарешин National Research Nuclear University MEPhI
  • Дмитрий Сергеевич Сильнов National Research Nuclear University MEPhI

Abstract

In article the issue of vulnerability of the data transferred on wireless networks using wi-fi technology is discussed. Safety of wireless access points in the territory of the NRNU MEPhI is analyzed, wi-fi access points with signs of vulnerability available outside the university territory are also analyzed. The cover zones of wireless networks belonging to NRNU MEPhI are illustrated.

Author Biographies

Сергей Владимирович Зарешин, National Research Nuclear University MEPhI

Graduate student of the department of computer systems and technologies

Дмитрий Сергеевич Сильнов, National Research Nuclear University MEPhI

Candidate of Technical Sciences, Associate Professor of the Department of Computer Systems and Technologies

References

1. Makneil P. Web-dizain. Idei, secrety, sovety. – P.: «Piter», 2011. – 272s.
2. W3C Markup Validation Service. URL: http://validator.w3.org/.
3. W3C CSS Validation Service/. URL http://jigsaw.w3.org/css-validator/.
4. Ritchie S. King «The Top 10 Programming Languages» // IEEE Spectrum. – 2011. URL: http://spectrum.ieee.org/at-work/techcareers/the-top-10-programming-languages.
5. D. S. Silnov An Analysis of Modern Approaches to the Delivery of Unwanted Emails (Spam). Indian Journal of Science and Technology, Vol 9(4), DOI: 10.17485/ijst/2016/v9i4/84803, January 2016
6. Devjatykh, D., Gerget, O., Berestneva, O.G. Sleep Apnea Detection Based on Dynamic Neural Networks (2014) Communications in Computer and Information Science, 466 CCIS, pp. 556-567.
7. Berestneva, O.G., Volovodenko, V.A., Gerget, O., Sharopin, K., Osadchaya, I.A. Multidimensional medical data visualization methods based on generalized graphic images (2013) World Applied Sciences Journal, 24 (24), pp. 18-23.
8. Belashenkova N.N., Cherepovskaya E.N., Lyamin A.V., Skshidlevsky A.A. Protection Methods of Assessment Procedures Used in eLearning // 13th International Conference on Emerging eLearning Technologies and Applications. – 2015. – P. 27-32.
9. Uskov, V., Lyamin, A., Lisitsyna, L., Sekar, B. (2014) Smart e-Learning as a Student-Centered Biotechnical System, In: E-Learning, EEducation, and Online-Training, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 138, Eds.: Vincenti, G., Bucciero, A., Vaz de Carvalho, C. , Springer, 200 p., ISBN 978-3-319-13292-1. pp. 167-176.
10. Arzhakov, A.V., Silnov, D.S. New approach to designing an educational automated test generation system based on text analysis (2016) ARPN Journal of Engineering and Applied Sciences, 11 (5), pp. 2993-2997
11. Arzhakov A. V., Silnov D. S. Analysis of Brute Force Attacks with Ylmf-pc Signature //International Journal of Electrical and Computer Engineering (IJECE). – 2016. – Т. 6. – №. 4.
12. Zikrillah M. Analisa Wardriving Scanning dan Maping Pada Wilayah Unsri Menggunakan Software Vistumbler v10. 6, Wigle Wifi Android, dan Google Earth //Buletin Inovasi ICT & Ilmu Komputer. – 2016.
13. Tews E. Attacks on the WEP protocol //IACR Cryptology ePrint Archive. – 2007. – Т. 2007. – С. 471.
14. Lashkari A. H., Danesh M. M. S., Samadi B. A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i) //Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on. – IEEE, 2009. – С. 48-52.
Published
2016-11-26
How to Cite
ЗАРЕШИН, Сергей Владимирович; СИЛЬНОВ, Дмитрий Сергеевич. COMPREHENSIVE ANALYSIS OF THE SECURITY OF WIRELESS NETWORKS NRNU MEPHI. Modern Information Technologies and IT-Education, [S.l.], v. 12, n. 4, p. 90-96, nov. 2016. ISSN 2411-1473. Available at: <http://sitito.cs.msu.ru/index.php/SITITO/article/view/148>. Date accessed: 07 dec. 2025.
Section
Research and development in the field of new IT and their applications

Most read articles by the same author(s)