메뉴 건너뛰기




Volumn , Issue , 2007, Pages 59-65

A study of the TKIP cryptographic DoS attack

Author keywords

[No Author keywords available]

Indexed keywords

802.11I; DOS ATTACKS; INTERNATIONAL CONFERENCES; NETWORK TRAFFICS; SECURITY PROTOCOLS; TEST BEDS; WEP PROTOCOLS; WIDESPREAD USE; WIRELESS NETWORK SERVICES;

EID: 48149113463     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICON.2007.4444062     Document Type: Conference Paper
Times cited : (8)

References (19)
  • 2
    • 48149100685 scopus 로고    scopus 로고
    • Niels Ferguson. Michael: an improved MIC for 802.11 WEP. IEEE 802.11 Working Group Document 02/020r0, Institution of Electrical and Electronics Engineers, January 2002. Available from http://grouper.ieee.org/groups/802/11/ Documents/DocumentHolder/2-020.zip.
    • Niels Ferguson. Michael: an improved MIC for 802.11 WEP. IEEE 802.11 Working Group Document 02/020r0, Institution of Electrical and Electronics Engineers, January 2002. Available from http://grouper.ieee.org/groups/802/11/ Documents/DocumentHolder/2-020.zip.
  • 3
    • 7544239419 scopus 로고    scopus 로고
    • A note on the fragility of the "Michael" message integrity code
    • September
    • Avishai Wool. A note on the fragility of the "Michael" message integrity code. IEEE Transactions on Wireless Communications, 3(5):1459-1462, September 2004.
    • (2004) IEEE Transactions on Wireless Communications , vol.3 , Issue.5 , pp. 1459-1462
    • Wool, A.1
  • 4
    • 48149110751 scopus 로고    scopus 로고
    • LAN/MAN Standard Committee of the IEEE Computer Society, Institution of Electrical and Electronics Engineers, July 2004. Available from
    • LAN/MAN Standard Committee of the IEEE Computer Society. IEEE Std 802.11i, Part 11: Medium Access Control (MAC) security enhancements. Institution of Electrical and Electronics Engineers, July 2004. Available from http://www.ieee.org/getIEEE.
    • IEEE Std 802.11i, Part 11: Medium Access Control (MAC) security enhancements
  • 6
    • 48149097806 scopus 로고    scopus 로고
    • Personal communication with author. email, May
    • Nikita Borisov. Personal communication with author. email, May 2007.
    • (2007)
    • Borisov, N.1
  • 7
    • 1542360013 scopus 로고    scopus 로고
    • Detection and handling of MAC layer misbehavior in wireless networks
    • San Francisco, CA, June, Institution of Electrical and Electronics Engineers
    • Pradeep Kyasanur and Nitin H. Vaidya. Detection and handling of MAC layer misbehavior in wireless networks. In International Conference on Dependable Systems and Networks (DSN'03), pages 173-, San Francisco, CA, June 2003. Institution of Electrical and Electronics Engineers.
    • (2003) International Conference on Dependable Systems and Networks (DSN'03) , pp. 173
    • Kyasanur, P.1    Vaidya, N.H.2
  • 9
    • 79955055383 scopus 로고    scopus 로고
    • Protecting wireless networks against a Denial of Service attack based on virtual jamming (poster session)
    • David B. Johnson, Anthony D. Joseph, and Nitin H. Vaidya, editors, San Diego, CA, USA, September, SIGMobile, ACM
    • Dazhi Chen, Jing Deng, and Pramod K. Varshney. Protecting wireless networks against a Denial of Service attack based on virtual jamming (poster session). In David B. Johnson, Anthony D. Joseph, and Nitin H. Vaidya, editors, The Ninth ACM Annual International Inproceedings on Mobile Computing and Networking (MobiCom 2003), San Diego, CA, USA, September 2003. SIGMobile, ACM.
    • (2003) The Ninth ACM Annual International Inproceedings on Mobile Computing and Networking (MobiCom 2003)
    • Chen, D.1    Deng, J.2    Varshney, P.K.3
  • 10
    • 84925368904 scopus 로고    scopus 로고
    • John Bellardo and Stefan Savage. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In Proceedings of the 12th USENIX Security Symposium, Washington D.C., August 2003. Available from http://www.usenix.org/publications/library/proceedings/sec03/tech/bellar do.html.
    • John Bellardo and Stefan Savage. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In Proceedings of the 12th USENIX Security Symposium, Washington D.C., August 2003. Available from http://www.usenix.org/publications/library/proceedings/sec03/tech/bellardo.html.
  • 11
    • 48149103484 scopus 로고    scopus 로고
    • Bernard Aboba. Issues in pre-standard IEEE 802.11i implementations. Webpage, 2004. Available from http://www.drizzle.com/~aboba/IEEE/prestand.html.
    • Bernard Aboba. Issues in pre-standard IEEE 802.11i implementations. Webpage, 2004. Available from http://www.drizzle.com/~aboba/IEEE/prestand.html.
  • 12
    • 3042619294 scopus 로고    scopus 로고
    • Improving the security of wireless LANs by managing 802.1X disassociation
    • Institution of Electrical and Electronics Engineers, January
    • Ping Q. Ding, JoAnne Holliday, and Aslihan Celik. Improving the security of wireless LANs by managing 802.1X disassociation. In Proceedings of the First IEEE Consumer Communications and Networking Conference, pages 53-58. Institution of Electrical and Electronics Engineers, January 2004.
    • (2004) Proceedings of the First IEEE Consumer Communications and Networking Conference , pp. 53-58
    • Ding, P.Q.1    Holliday, J.2    Celik, A.3
  • 14
    • 85143166035 scopus 로고    scopus 로고
    • Security analysis and improvements for IEEE, 802.11i
    • The Internet Society, February 2005. Available from
    • Changhua He and John C. Mitchell. Security analysis and improvements for IEEE, 802.11i. In Network and Distributed System Security Symposium Proceedings: 2005, pages 90-110. The Internet Society, February 2005. Available from http://www.isoc.org/isoc/conferences/ndss/05/proceedings/index. htm.
    • (2005) Network and Distributed System Security Symposium Proceedings , pp. 90-110
    • He, C.1    Mitchell, J.C.2
  • 15
    • 48149112716 scopus 로고    scopus 로고
    • Dan Harkins. Attacks against Michael and their countermeasures. IEEE 802.11 Working Group Document 03/211r0, Institution of Electrical and Electronics Engineers, March 2003. Available from http://grouper.ieee.org/ groups/802/11/Documents/DocumentHolder/3-211.zip.
    • Dan Harkins. Attacks against Michael and their countermeasures. IEEE 802.11 Working Group Document 03/211r0, Institution of Electrical and Electronics Engineers, March 2003. Available from http://grouper.ieee.org/ groups/802/11/Documents/DocumentHolder/3-211.zip.
  • 17
    • 4544317724 scopus 로고    scopus 로고
    • Wireless intrusion detection and response: A case study using the classic man-in-themiddle attack
    • March
    • Tim Schmoyer, Yu-Xi Lim, and Henry L. Owen. Wireless intrusion detection and response: a case study using the classic man-in-themiddle attack. In 2004 IEEE Wireless Communications and Networking Conference, volume 2, pages 883-888, March 2004.
    • (2004) 2004 IEEE Wireless Communications and Networking Conference , vol.2 , pp. 883-888
    • Schmoyer, T.1    Lim, Y.-X.2    Owen, H.L.3
  • 18
    • 48149096827 scopus 로고    scopus 로고
    • Information security breaches survey. Technical report, April, Available from
    • Price Waterhouse Coopers. Information security breaches survey. Technical report, DTI, April 2006. Available from http://www.pwc.com/Extweb/ pwcpublications.nsf/docid/F9843CD3C8E0FB828025715A0058C63B.
    • (2006)
    • Waterhouse Coopers, P.1
  • 19
    • 48149085835 scopus 로고    scopus 로고
    • Phil Cracknell. Wireless security survey of London 2006. A report commissioned by RSA Security 5th edition, RSA Security, Bracknell, UK, May 2006. Available only on request.
    • Phil Cracknell. Wireless security survey of London 2006. A report commissioned by RSA Security 5th edition, RSA Security, Bracknell, UK, May 2006. Available only on request.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.