[go: up one dir, main page]

Simic et al., 2007 - Google Patents

A survey of wireless security

Simic et al., 2007

View PDF
Document ID
16994141486087581385
Author
Simic D
Prodanovic R
Publication year
Publication venue
Journal of computing and information technology

External Links

Snippet

Sažetak Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as …
Continue reading at hrcak.srce.hr (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it

Similar Documents

Publication Publication Date Title
Qiu et al. A mutual authentication and key establishment scheme for M2M communication in 6LoWPAN networks
EP2522100B1 (en) Secure multi-uim authentication and key exchange
Boakye-Boateng et al. Encryption protocol for resource-constrained devices in fog-based IoT using one-time pads
US7555128B2 (en) Systems and methods for the application of cryptosystems to the data link layer of packetized wireless networks
Khasawneh et al. A survey on Wi-Fi protocols: WPA and WPA2
Brown 802.11: the security differences between b and i
Lackner A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX.
Simic et al. A survey of wireless security
Xing et al. Security analysis and authentication improvement for ieee 802.11 i specification
Shojaie et al. Enhancing EAP-TLS authentication protocol for IEEE 802.11 i
Xiao et al. Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
Yao et al. Enhancing RC4 algorithm for WLAN WEP protocol
Hassinen Overview of WLAN security
Turab et al. A comparison between wireless LAN security protocols
Muthavhine et al. An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices
Asante et al. Analysis of security vulnerabilities in wifi-protected access pre-shared key
Sarmiento et al. Basic security measures for IEEE 802.11 wireless networks
Arkko et al. RFC 9678: Forward Secrecy Extension to the Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA'FS)
Ananda Mohan et al. WiFi Security-A Tutorial
Preuß et al. Forward Secrecy Extension to the Improved
Jain et al. SAP: a low-latency protocol for mitigating evil twin attacks and high computation overhead in WI-FI networks
Jiang et al. A mutual authentication and privacy mechanism for WLAN security
Pervaiz et al. Security in wireless local area networks
Vaidya et al. Authentication mechanism using one-time password for 802.11 wireless LAN
Ahmad et al. Attack Robustness and Security Enhancement with Improved Wired Equivalent Protocol