0% found this document useful (0 votes)
35 views

Wireless Security

Uploaded by

IbmWasuser
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

Wireless Security

Uploaded by

IbmWasuser
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

J

N
T
U
W
O
R
L
D
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6

Code No: D4006
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
M.Tech II - SEMESTER EXAMINATIONS, APRIL/MAY-2013
WIRELESS SECURITY
(INFORMATION TECHNOLOGY)
Time: 3hours Max.Marks:60
Answer any five questions
All questions carry equal marks
- - -

1.a) Explain the Reconfiguring method in Adhoc Networks.


b) Brief about the War Driving/Walking/Chalking security issues.

2.a) Discuss the Computational and Data Overhead Security Approaches.
b) Explain the Integrity Codes for Security.

3.a) Explain the AAA Protocol.
b) Write about the Encapsulating Security Payload (ESP).

4. Explain the Bluetooth Security Mechanisms in detail.

5.a) Discuss about the Data frame Security in WLANs.
b) Write about the secure authentication in WLANs.

6.a) Write about the anything is better than nothing in WPA.
b) Discuss the End To End VPN in IEEE 802.11i

7.a) Explain the IEEE 802.16 Subscriber Station(SS) Authorization.
b) Discuss about the IEEE 802.16 Key Management Systems.

8.a) Write about the Problems with GSM Security and Weak Encryption Algorithm.
b) Compare the Security of CDMA and GSM.

*****

R09
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net www.android.jntuworld.com

You might also like