Kizza et al., 2008 - Google Patents
Security in Wireless SystemsKizza et al., 2008
- Document ID
- 1154224156942073628
- Author
- Kizza J
- Kizza F
- Publication year
- Publication venue
- Securing the Information Infrastructure
External Links
Snippet
Seeing wireless technology in action around us today, it is difficult to image that just about 20 years ago, the technology and the industry were still in their infancy. Wireless technology has grown in leaps and bounds in the last few years. It is also mind bogging to imagine what …
- 238000005516 engineering process 0 abstract description 58
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1042—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving topology management mechanisms
- H04L67/1044—Group management mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1074—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks for supporting resource transmission mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1087—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving cross functional networking aspects
- H04L67/1093—Some peer nodes performing special functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1061—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving node-based peer discovery mechanisms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Housley et al. | Security problems in 802.11-based networks | |
JP4194046B2 (en) | SIM-based authentication and encryption system, apparatus and method for wireless local area network access | |
EP2403283B1 (en) | Improved subscriber authentication for unlicensed mobile access signaling | |
US7565529B2 (en) | Secure authentication and network management system for wireless LAN applications | |
JP3585422B2 (en) | Access point device and authentication processing method thereof | |
US12250545B2 (en) | Systems and methods for multi-link device privacy protection | |
US20040215957A1 (en) | Authentication and encryption method and apparatus for a wireless local access network | |
US20090019539A1 (en) | Method and system for wireless communications characterized by ieee 802.11w and related protocols | |
Kizza | Security in wireless networks and devices | |
Singh et al. | Analysis of security issues and their solutions in wireless LAN | |
Saedy et al. | Ad hoc M2M communications and security based on 4G cellular system | |
Schmid et al. | An access control architecture for microcellular wireless IPv6 networks | |
Mateti | Hacking techniques in wireless networks | |
Wong | Performance investigation of secure 802.11 wireless LANs: Raising the security bar to which level? | |
Kizza et al. | Security in Wireless Systems | |
Feil | 802.11 wireless network policy recommendation for usage within unclassified government networks | |
Rawat et al. | Wireless network security: An overview | |
Kizza | Security in wireless networks | |
Young | Detecting Wireless Security Threats Through IEEE 802.11 Frame Field Anomalies | |
Ma et al. | Security Access in Wireless Local Area Networks | |
Gherghina et al. | Wireless LAN security issues (I)-types of attacks | |
Jaiaree | The security aspects of wireless local area network (WLAN) | |
Lykouropoulos et al. | Connect street light control devices in a secure network | |
Kamaruddin | Security performance of a wireless LAN testbed | |
Issac et al. | Wireless LAN setup and security loopholes |