TY - GEN
T1 - Implementing Encryption Algorithms for the Protection of Wireless Networks
AU - Ahmad, Naseem
AU - Madhura, K.
AU - Agarwal, Trapty
AU - Zaidi, Taskeen
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
PY - 2025
Y1 - 2025
N2 - The use of encryption algorithms is more and more turning into a crucial issue of defensive wireless networks. Encryption algorithms may be used to cozy facts that is transferred over a Wi-Fi network while also presenting authentication and integrity protocols for the systems connected to the network. This paper discusses the significance of enforcing encryption algorithms for the safety of a wireless community. It describes the distinct encryption algorithms and protocols which are available, and the criteria for selecting the proper algorithm for exclusive varieties of Wi-Fi networks. It additionally provides unique implementation eventualities based totally on numerous sorts of Wi-Fi community structure in addition to the vast security threats in Wi-Fi networks that may be averted by imposing encryption algorithms. Finally, this paper offers guidelines on selecting and imposing the perfect encryption set of rules for safety of wireless networks.
AB - The use of encryption algorithms is more and more turning into a crucial issue of defensive wireless networks. Encryption algorithms may be used to cozy facts that is transferred over a Wi-Fi network while also presenting authentication and integrity protocols for the systems connected to the network. This paper discusses the significance of enforcing encryption algorithms for the safety of a wireless community. It describes the distinct encryption algorithms and protocols which are available, and the criteria for selecting the proper algorithm for exclusive varieties of Wi-Fi networks. It additionally provides unique implementation eventualities based totally on numerous sorts of Wi-Fi community structure in addition to the vast security threats in Wi-Fi networks that may be averted by imposing encryption algorithms. Finally, this paper offers guidelines on selecting and imposing the perfect encryption set of rules for safety of wireless networks.
UR - https://www.scopus.com/pages/publications/85208191619
UR - https://www.scopus.com/pages/publications/85208191619#tab=citedBy
U2 - 10.1007/978-981-97-8043-3_33
DO - 10.1007/978-981-97-8043-3_33
M3 - Conference contribution
AN - SCOPUS:85208191619
SN - 9789819780426
T3 - Lecture Notes in Electrical Engineering
SP - 208
EP - 214
BT - Proceedings of the 5th International Conference on Data Science, Machine Learning and Applications - ICDSMLA 2023
A2 - Kumar, Amit
A2 - Gunjan, Vinit Kumar
A2 - Senatore, Sabrina
A2 - Hu, Yu-Chen
PB - Springer Science and Business Media Deutschland GmbH
T2 - 5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
Y2 - 15 December 2023 through 16 December 2023
ER -