Explore chapters and articles related to this topic
Introduction and Setup of Raspberry Pi
Published in Anudeep Juluru, Shriram K. Vasudevan, T. S. Murugesh, fied!, 2023
Anudeep Juluru, Shriram K. Vasudevan, T. S. Murugesh
The process until flashing the Raspberry Pi OS to the micro SD card is the same as the previous method. If the flashing is successful, you’ll see a boot drive in the File Explorer or Finder as shown in Figure 29.28. This drive contains all the flashed OS files. Open it and create two new files named SSH and wpa_supplicant.conf as shown in Figure 29.29. Open the wpa_supplicant.conf file and paste the following content in it. Change <> with your country’s 2 letter ISO 1366-1 code, <> and <> with the name and password of your WiFi, respectively. You can refer to this link (https://en.wikipedia.org/wiki/ISO_3166-1; last edited June 12, 2022) to find your country’s ISO 1366-1 code. SSH (Secure Shell) is an empty file with no extension. ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev country=<Country Code> update_config=1 network={ ssid="<Name of your WiFi>" psk="<Password for your WiFi>" }
Wireless Security Wi-Fi
Published in Ali Youssef, Douglas McDonald II, Jon Linton, Bob Zemke, Aaron Earle, Wi-Fi Enabled Healthcare, 2014
Ali Youssef, Douglas McDonald II, Jon Linton, Bob Zemke, Aaron Earle
The Service Set Identifier (SSID) was never intended to be used to perform any type of security measures. The SSID’s main purpose is for network identification as the name states. When a client’s end device connects to the network, it has to have an identification setting to allow it to know what network to connect and operate on. When the wireless standards were created, the IEEE members had the foresight to realize that there may be more than one wireless network within range. This led to the creation of the SSID as a means to differentiate one wireless network from another. Today with the massive number of wireless networks, this has become a necessity.
Tackling Intruders in Wireless Mesh Networks
Published in Qurban A. Memon, Distributed Networks, 2017
Al-Sakib Khan Pathan, Shapla Khanam, Habibullah Yusuf Saleem, Wafaa Mustafa Abduallah
Some WLANs also use wireless switches, which act as intermediaries between access points and the wired network. A network based on stations and access points is configured in infrastructure mode; a network that does not use an access point, in which stations connect directly to each other, is configured in an ad hoc mode. Nearly all organisational WLANs use the infrastructure mode. Each access point in a WLAN has a name assigned to it called a service set identifier (SSID). The SSID allows stations to distinguish one WLAN from another.
A distribute and self-tuning wireless environment monitoring system for buildings based on the Wi-Fi Direct technology
Published in Science and Technology for the Built Environment, 2018
When a new sensor node is added into the network, it will try to find an accessible node. The newcomer would have found more than one candidate superior node in different hierarchies. For example, sensor 9 will find that it can access sensor 5, sensor 4, and sensor 2 within the limitation of received signal strength indication (RSSI) and these nodes are marked as being able to reach the root node. If sensor 4 is busy or the number of subordinate nodes has exceeded the limitation, sensor 9 will try sensor 5 then sensor 3 in random order. When sensor 9 joins a node successfully, it will record the node as its superior point and try to join it next time. A mark will be added to service set identifier (SSID) when a node has joined successfully to tell other newcomers that it can reach the root node.