Muchenje, 2008 - Google Patents
Investigation of security issues on a converged WiFi and WiMAX wireless networkMuchenje, 2008
- Document ID
- 3220896349952752045
- Author
- Muchenje T
- Publication year
External Links
- 238000009114 investigational therapy 0 title description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0853—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/04—Key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Karygiannis et al. | Wireless Network Security:. | |
Alotaibi et al. | Rogue access point detection: Taxonomy, challenges, and future directions | |
Frankel et al. | Establishing wireless robust security networks: A guide to IEEE 802.11 i | |
Sobh | Wi-Fi networks security and accessing control | |
Guo | Survey on wifi infrastructure attacks | |
Scarfone et al. | Guide to securing legacy IEEE 802.11 wireless networks | |
Scarfone et al. | Guide to securing WiMAX wireless communications | |
Wong | Performance investigation of secure 802.11 wireless LANs: Raising the security bar to which level? | |
Muchenje | Investigation of security issues on a converged WiFi and WiMAX wireless network | |
Scarfone et al. | Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT) | |
Vuori | A methodology for assessing cyber security in Zigbee-based IoT | |
Faraj | Security technologies for wireless access to local area networks | |
Gonçalves | A flexible framework for rogue access point detection | |
Scarfone et al. | Sp 800-48 rev. 1. guide to securing legacy ieee 802.11 wireless networks | |
Liang et al. | The practical risk assessment for enterprise Wireless Local Area Network | |
Ma et al. | Security Access in Wireless Local Area Networks | |
Mwenja | Framework for securing wireless local area network | |
Villegas et al. | Analysis of tools for conducting Wireless Penetration Testing | |
Frankel et al. | SP 800-97. establishing wireless robust security networks: A guide to IEEE 802.11 i | |
Ross | Securing IEEE 802.11 Wireless LANs | |
Ercan | Modeling and designing wireless networks for corporations: Security policies and reconfiguration | |
Nwabude | Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures | |
Ozturk | Evaluation of secure 802.1 X port-based network access authentication over 802.11 wireless local area networks | |
Kamaruddin | Security performance of a wireless LAN testbed | |
Diakite | WISP: A Wireless Information Security Portal |