Security Approaches in Wireless Home Networks – The Incipient drifts and Surviving Glitches
Dhowmya Bhatt1, Ekata Gupta2

1Dhowmya Bhatt, Research Scholar, Mewar University, Chittorgarh (Rajasthan), India.
2Ekata Gupta, Associate Professor, Department of Mathematics, Krishna Institute of Engineering and Technology, Ghaziabad(U.P.), India
Manuscript received on September 01, 2012. | Revised Manuscript received on September 02, 2012. | Manuscript published on September 05, 2012. | PP: 251-254 | Volume-2 Issue-4, September 2012. | Retrieval Number: D0919072412/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: The usage of wireless Networks have almost become inevitable for the human community. From a simple point to point communication to extra-large-area covering networks, wireless communication is a significant part and parcel of technological progress that mankind has ever made. As the vast convention of wireless has increased than ever before, it also becomes the matter of concern of how to protect these networks from attacks and attackers and ensure the users safe and secured communication. It is worthwhile to note that the Right to the protect the moral and material interests resulting from any scientific production owned by an individual is one of the basics of Human rights declaration. Hence it is very much essential to implement and practice methods to secure wireless networks in a very strict manner so as to ensure confidentiality of the information transmitted and ensure people involved communication some absolutely reliable safety. The attempt to safeguard home wireless networks will greatly benefit mankind which not otherwise would be a huge loss to the entire human community. This Paper is an effort to throw light on the upcoming trends in securing wireless networks and the external threats to these networks. Possible future directions are also addressed towards the end.
Keywords: Security, privacy, attacks, intruders