• Aug 09, 2018 News![CFP] The annual meeting of IJFCC Editorial Board, ICCTD 2019, will be held in Prague, Czech Republic during March 2-4, 2019.   [Click]
  • Aug 09, 2018 News!IJFCC Vol. 6, No. 1-No. 3 has been indexed by EI (Inspec).   [Click]
  • Apr 02, 2019 News!The papers published in Vol.7, No.3-No.4 have all received dois from Crossref.
General Information
    • ISSN: 2010-3751
    • Frequency: Bimonthly (2012-2016); Quarterly (Since 2017)
    • DOI: 10.18178/IJFCC
    • Editor-in-Chief: Prof. Mohamed Othman
    • Executive Editor: Ms. Cherry L. Chan
    • Abstracting/ Indexing: Google Scholar,  Crossref, Electronic Journals LibraryEI (INSPEC, IET), etc.
    • E-mail:  ijfcc@ejournal.net 
Prof. Mohamed Othman
Department of Communication Technology and Network Universiti Putra Malaysia, Malaysia
It is my honor to be the editor-in-chief of IJFCC. The journal publishes good papers in the field of future computer and communication. Hopefully, IJFCC will become a recognized journal among the readers in the filed of future computer and communication.
IJFCC 2012 Vol.1(3): 277-279 ISSN: 2010-3751
DOI: 10.7763/IJFCC.2012.V1.74

Insecurity of WLAN for M-Learning Implementation in Tertiary Level by DoS

Chandrasekaran Nammalwar and Rajeswari C.

Abstract—Mobility, mobile technology and mobile computing are few buzz words in all the fields. This makes human beings life easy and goes for anywhere, anytime working conditions. In educational field Networking and mobile computing are playing major role in the shift from the traditional black board teaching to contemporary E-Learning and M-Learning environment. But the major issue with the wireless network is vulnerability, denial of service and in general security compared to the wired network. To secure WLAN in organizations and institutions, the world is moving to ubiquitous and seamless computing environments. On the negative side, unlike wired networks, these networks are more vulnerable making it easy for an intruder to capture transmitted signals and also send massive volume of illegitimate traffic and utilize system resources in a way that renders the system inoperable thus denying access to authorized users. This paper demonstrated different methods of achieving denial of service (DoS) attack as it applies to wireless networks and discusses and proposes different defense mechanisms so as to minimize the attacks.

Index Terms—Network security, network vulnerability, DoS, DDoS.

The authors are with the Botho College, Gaborone, Botswana (e-mail: chandarasekaran.namalwar@bothocollege.ac.bw., Tel.: + 267-74703230, fax: + 267-3911252).


Cite: Chandrasekaran Nammalwar and Rajeswari C., "Insecurity of WLAN for M-Learning Implementation in Tertiary Level by DoS," International Journal of Future Computer and Communication vol. 1, no. 3, pp. 277-279, 2012.

Copyright © 2008-2018. International Journal of Future Computer and Communication. All rights reserved.
E-mail: ijfcc@ejournal.net