학술논문

An Evaluation of Authentication Technologies for Web-Based Wireless Network security
Document Type
Conference
Source
2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC) Power Energy, Environment & Intelligent Control (PEEIC), 2023 International Conference on. :1637-1642 Dec, 2023
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
General Topics for Engineers
Power, Energy and Industry Applications
Signal Processing and Analysis
Wireless networks
Authentication
Network security
Writing
Safety
Communication system security
Usability
Authentication technologies
Literature evaluate Technology
Language
Abstract
Technical details about the assessment of Authentication technology for internet-based totally wireless community protection thesis the thesis on “An evaluation of Authentication technologies for net-based totally Wi-Fi network security” objectives to evaluate and evaluate various authentication technologies to comfy net-primarily based Wi-Fi networks. The following are the technical information of the thesis: 1. studies goal: the main goal of this thesis is to assess and evaluate specific authentication technology for securing internet-based totally Wi- Fi networks. The examine also aims to spotlight the strengths and weaknesses of each technology and offer suggestions for the simplest technique to securing net-based Wi-Fi networks.2. Method: The research methodology used in this thesis is a comparative analysis, where specific authentication technology are in comparison primarily based on a set of predetermined criteria. The standards include security, usability, compatibility, performance, and fee-effectiveness.3. Literature evaluate: The thesis evaluations the prevailing literature on web-primarily based wireless community security and authentication technology. It gives a top level view of the current nation of the art on this subject and identifies the gaps in research that this take a look at aims to fill.4. Records collection: The data for the evaluation of authentication technologies is accrued from various resources including research papers, technical reports, and industry whitepapers. The records is then analyzed to perceive patterns, traits, and commonalities many of the extraordinary technologies.