Simic et al., 2007 - Google Patents
A survey of wireless securitySimic et al., 2007
View PDF- Document ID
- 16994141486087581385
- Author
- Simic D
- Prodanovic R
- Publication year
- Publication venue
- Journal of computing and information technology
External Links
Snippet
Sažetak Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as …
- 238000010835 comparative analysis 0 abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Qiu et al. | A mutual authentication and key establishment scheme for M2M communication in 6LoWPAN networks | |
| EP2522100B1 (en) | Secure multi-uim authentication and key exchange | |
| Boakye-Boateng et al. | Encryption protocol for resource-constrained devices in fog-based IoT using one-time pads | |
| US7555128B2 (en) | Systems and methods for the application of cryptosystems to the data link layer of packetized wireless networks | |
| Khasawneh et al. | A survey on Wi-Fi protocols: WPA and WPA2 | |
| Brown | 802.11: the security differences between b and i | |
| Lackner | A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX. | |
| Simic et al. | A survey of wireless security | |
| Xing et al. | Security analysis and authentication improvement for ieee 802.11 i specification | |
| Shojaie et al. | Enhancing EAP-TLS authentication protocol for IEEE 802.11 i | |
| Xiao et al. | Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs | |
| Yao et al. | Enhancing RC4 algorithm for WLAN WEP protocol | |
| Hassinen | Overview of WLAN security | |
| Turab et al. | A comparison between wireless LAN security protocols | |
| Muthavhine et al. | An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices | |
| Asante et al. | Analysis of security vulnerabilities in wifi-protected access pre-shared key | |
| Sarmiento et al. | Basic security measures for IEEE 802.11 wireless networks | |
| Arkko et al. | RFC 9678: Forward Secrecy Extension to the Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA'FS) | |
| Ananda Mohan et al. | WiFi Security-A Tutorial | |
| Preuß et al. | Forward Secrecy Extension to the Improved | |
| Jain et al. | SAP: a low-latency protocol for mitigating evil twin attacks and high computation overhead in WI-FI networks | |
| Jiang et al. | A mutual authentication and privacy mechanism for WLAN security | |
| Pervaiz et al. | Security in wireless local area networks | |
| Vaidya et al. | Authentication mechanism using one-time password for 802.11 wireless LAN | |
| Ahmad et al. | Attack Robustness and Security Enhancement with Improved Wired Equivalent Protocol |