You are on page 1of 1

J

N
T
U
W
O
R
L
D
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6
Q6

Code No: D7811
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
M.Tech II SEMESTER EXAMINATIONS, APRIL/MAY-2013
WIRELESS SECURITY
(COMPUTER NETWORKS AND INFORMATION SECURITY)
Time: 3hours Max. Marks: 60
Answer any five questions
All questions carry equal marks
- - -

1. (a) Discuss the Routing Problems in Wireless Adhoc Networks.


(b) Write about the physical Intercept Problems in Wireless Systems.

2. (a) Discuss the Checksum Security mechanism to protect the data.
(b) Explain the Traffic Analysis method for security.

3. (a) What is the Importance of Authentication Header (AH) in IPSec
(b) Brief about the Authentication Protocols in Wireless systems.

4. Discuss about the Bluetooth Security Modes in detail.

5. (a) Discuss the drawbacks of WEP, Security Protocol in WLANs.
(b) Explain the Access Control via 802.1x

6. Explain about the Wi-Fi Protected Access (WPA).

7. (a) Discuss about the IEEE 802.11i Security Protocol
(b) Write about the IEEE 802.16 Security.

8. (a) Explain the Security mechanism in CDMA
(b) Write about the GSM Authentication

*****
R09
www.jntuworld.com
www.jntuworld.com
www.jwjobs.net www.android.jntuworld.com

You might also like