COMPREHENSIVE ANALYSIS OF THE SECURITY OF WIRELESS NETWORKS NRNU MEPHI
Abstract
In article the issue of vulnerability of the data transferred on wireless networks using wi-fi technology is discussed. Safety of wireless access points in the territory of the NRNU MEPhI is analyzed, wi-fi access points with signs of vulnerability available outside the university territory are also analyzed. The cover zones of wireless networks belonging to NRNU MEPhI are illustrated.
References
2. W3C Markup Validation Service. URL: http://validator.w3.org/.
3. W3C CSS Validation Service/. URL http://jigsaw.w3.org/css-validator/.
4. Ritchie S. King «The Top 10 Programming Languages» // IEEE Spectrum. – 2011. URL: http://spectrum.ieee.org/at-work/techcareers/the-top-10-programming-languages.
5. D. S. Silnov An Analysis of Modern Approaches to the Delivery of Unwanted Emails (Spam). Indian Journal of Science and Technology, Vol 9(4), DOI: 10.17485/ijst/2016/v9i4/84803, January 2016
6. Devjatykh, D., Gerget, O., Berestneva, O.G. Sleep Apnea Detection Based on Dynamic Neural Networks (2014) Communications in Computer and Information Science, 466 CCIS, pp. 556-567.
7. Berestneva, O.G., Volovodenko, V.A., Gerget, O., Sharopin, K., Osadchaya, I.A. Multidimensional medical data visualization methods based on generalized graphic images (2013) World Applied Sciences Journal, 24 (24), pp. 18-23.
8. Belashenkova N.N., Cherepovskaya E.N., Lyamin A.V., Skshidlevsky A.A. Protection Methods of Assessment Procedures Used in eLearning // 13th International Conference on Emerging eLearning Technologies and Applications. – 2015. – P. 27-32.
9. Uskov, V., Lyamin, A., Lisitsyna, L., Sekar, B. (2014) Smart e-Learning as a Student-Centered Biotechnical System, In: E-Learning, EEducation, and Online-Training, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 138, Eds.: Vincenti, G., Bucciero, A., Vaz de Carvalho, C. , Springer, 200 p., ISBN 978-3-319-13292-1. pp. 167-176.
10. Arzhakov, A.V., Silnov, D.S. New approach to designing an educational automated test generation system based on text analysis (2016) ARPN Journal of Engineering and Applied Sciences, 11 (5), pp. 2993-2997
11. Arzhakov A. V., Silnov D. S. Analysis of Brute Force Attacks with Ylmf-pc Signature //International Journal of Electrical and Computer Engineering (IJECE). – 2016. – Т. 6. – №. 4.
12. Zikrillah M. Analisa Wardriving Scanning dan Maping Pada Wilayah Unsri Menggunakan Software Vistumbler v10. 6, Wigle Wifi Android, dan Google Earth //Buletin Inovasi ICT & Ilmu Komputer. – 2016.
13. Tews E. Attacks on the WEP protocol //IACR Cryptology ePrint Archive. – 2007. – Т. 2007. – С. 471.
14. Lashkari A. H., Danesh M. M. S., Samadi B. A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i) //Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on. – IEEE, 2009. – С. 48-52.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.
