Open Access Open Access  Restricted Access Subscription Access

Performance Evaluation of Feed Forward Neural Network for Wired Equivalent Privacy/Wi-Fi Protected Access Protocols


Affiliations
1 Department of Computer Science, Maharaja Surajmal Institute, Janakpuri, New Delhi - 110058, India
2 Department of Mathematics, Maharashi Dayanand University, Rohtak - 124001, Haryana, India
 

Objective: Millions of people use wireless devices in their day to day diligences without knowing the security facets of Wireless Technology. The aim of our research is to enhance the execution of widely used wireless devices's protocols by examining their behavior with Feed Forward Neural Network. Fundamentally, Neural Network is a multilayer perceptron network. It processes the records one at a time and "learn" by comparing the obtained output with the actual output. Hidden layer neurons play a cardinal role in the performance of Back Propagation. The process of determining the number of hidden layer neurons is still obscure. The work is focused on performance evaluation of the hidden layer neurons for WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) protocols. Methods/Statistical Analysis: For this work, three network architectures have been picked out to perform the analysis. The research work is carried out by using Back Propagation Algorithm in Neural Network Toolbox on the data captured by using Wireshark tool. Findings: The behavior of various unlike hidden neurons is evaluated through simulation technique. Network performance is also diagnosed with the help of epochs and Mean Square Error (MSE). The performance of Neural Network is evaluated and outcomes indicate that hidden layer neurons affect the functioning of the network. Improvement: We would like to work with the parameter and learning of the Neural Network to achieve best results.

Keywords

Back Propagation, Feed Forward Neural Network, Hidden Layer, Mean Square Error, Wi-Fi Protected Access, Wired Equivalent Privacy.
User

Abstract Views: 150

PDF Views: 0




  • Performance Evaluation of Feed Forward Neural Network for Wired Equivalent Privacy/Wi-Fi Protected Access Protocols

Abstract Views: 150  |  PDF Views: 0

Authors

Menal Dahiya
Department of Computer Science, Maharaja Surajmal Institute, Janakpuri, New Delhi - 110058, India
Sumeet Gill
Department of Mathematics, Maharashi Dayanand University, Rohtak - 124001, Haryana, India

Abstract


Objective: Millions of people use wireless devices in their day to day diligences without knowing the security facets of Wireless Technology. The aim of our research is to enhance the execution of widely used wireless devices's protocols by examining their behavior with Feed Forward Neural Network. Fundamentally, Neural Network is a multilayer perceptron network. It processes the records one at a time and "learn" by comparing the obtained output with the actual output. Hidden layer neurons play a cardinal role in the performance of Back Propagation. The process of determining the number of hidden layer neurons is still obscure. The work is focused on performance evaluation of the hidden layer neurons for WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) protocols. Methods/Statistical Analysis: For this work, three network architectures have been picked out to perform the analysis. The research work is carried out by using Back Propagation Algorithm in Neural Network Toolbox on the data captured by using Wireshark tool. Findings: The behavior of various unlike hidden neurons is evaluated through simulation technique. Network performance is also diagnosed with the help of epochs and Mean Square Error (MSE). The performance of Neural Network is evaluated and outcomes indicate that hidden layer neurons affect the functioning of the network. Improvement: We would like to work with the parameter and learning of the Neural Network to achieve best results.

Keywords


Back Propagation, Feed Forward Neural Network, Hidden Layer, Mean Square Error, Wi-Fi Protected Access, Wired Equivalent Privacy.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i31%2F131299