메뉴 건너뛰기




Volumn , Issue , 2007, Pages 292-297

Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2)

Author keywords

AES (Advanced Encryption Standard); IEEE802.11x; TKIP (Temporal Key Integrity Protocol); WEP (Wireless Equivalent Privacy); Wireless LAN; WPA (Wi Fi Protected Access)

Indexed keywords

COMMUNICATION; COMMUNICATION SYSTEMS; COMPUTER NETWORKS; CRYPTOGRAPHY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; QUALITY ASSURANCE; SENSOR NETWORKS; STANDARDS; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 54949154877     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (16)
  • 1
    • 3142552643 scopus 로고    scopus 로고
    • A key recovery attack on the 802.11b wired equivalent privacy protocol
    • Stubblefield, A., Ioannidis, J., Rubin, A.. A key recovery attack on the 802.11b wired equivalent privacy protocol. ACM Trans. Inf. Syst. Secur., 2004. 7(2): p.319.
    • (2004) ACM Trans. Inf. Syst. Secur , vol.7 , Issue.2 , pp. 319
    • Stubblefield, A.1    Ioannidis, J.2    Rubin, A.3
  • 2
    • 11144349702 scopus 로고    scopus 로고
    • Wireless LAN security and laboratory designs
    • Yasir, Z. and Yang. T., Wireless LAN security and laboratory designs. J. Comput. Small Coll., 2004. 19(3): p. 44-60.
    • (2004) J. Comput. Small Coll , vol.19 , Issue.3 , pp. 44-60
    • Yasir, Z.1    Yang, T.2
  • 3
    • 54949139460 scopus 로고    scopus 로고
    • Arbaugh, W., Shankar, N. and Wan, Y., Your 802.11 Wireless Network has No Clothes. 2001, University of Maryland: Maryland. p. 1-13.
    • Arbaugh, W., Shankar, N. and Wan, Y., Your 802.11 Wireless Network has No Clothes. 2001, University of Maryland: Maryland. p. 1-13.
  • 4
    • 0038187631 scopus 로고    scopus 로고
    • Security problems in 802.11-based networks
    • Housley, R.. and Arbaugh, W., Security problems in 802.11-based networks. Com. ACM, 2003. 46(5): p. 31-34.
    • (2003) Com. ACM , vol.46 , Issue.5 , pp. 31-34
    • Housley, R.1    Arbaugh, W.2
  • 5
    • 33747068192 scopus 로고    scopus 로고
    • 802.11: The Security Difference Between b and i. 2003
    • November
    • Brown, B., 802.11: The Security Difference Between b and i. 2003, IEEE Potentials, Vol 22 No 4 p. 23-27, November 2003
    • (2003) IEEE Potentials , vol.22 , Issue.4 , pp. 23-27
    • Brown, B.1
  • 6
    • 10044272863 scopus 로고    scopus 로고
    • Wireless infidelity II: Airjacking
    • Berghel, H. and Uecker, J., Wireless infidelity II: airjacking. Com. ACM, 2004. 47(12): p. 15-20.
    • (2004) Com. ACM , vol.47 , Issue.12 , pp. 15-20
    • Berghel, H.1    Uecker, J.2
  • 7
    • 0034777649 scopus 로고    scopus 로고
    • th Annual Conf. on Mobile Computing and Networking, Rome, Italy
    • ACM SIGMOBILE
    • th Annual Conf. on Mobile Computing and Networking, Rome, Italy, p. 180-189, ACM SIGMOBILE, 2001.
    • (2001) , pp. 180-189
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 10
    • 0037766154 scopus 로고    scopus 로고
    • Security flaws in 802.11 data link protocols
    • Cam-Winget, N., Housley, R., Wagner, D., Walker, J. Security flaws in 802.11 data link protocols. Com. ACM, 2003. 46(5): p. 35-39.
    • (2003) Com. ACM , vol.46 , Issue.5 , pp. 35-39
    • Cam-Winget, N.1    Housley, R.2    Wagner, D.3    Walker, J.4
  • 11
    • 54949138279 scopus 로고    scopus 로고
    • Examining 802.11i and WPA: The New Standards - Up Close
    • Robinson, F., Examining 802.11i and WPA: The New Standards - Up Close. Network Computing, Ap. 2004.
    • (2004) Network Computing, Ap
    • Robinson, F.1
  • 12
    • 54949120066 scopus 로고    scopus 로고
    • IEEE, IEEE Standard for Local and Metropolitan Area Networks: Port Based Network Access Control. 2004, IEEE. p. 1-179.
    • IEEE, IEEE Standard for Local and Metropolitan Area Networks: Port Based Network Access Control. 2004, IEEE. p. 1-179.
  • 15
    • 16244367428 scopus 로고    scopus 로고
    • Wireless LAN security and IEEE 802.11i
    • Chen, J., Jiang, M., Liu, Y., Wireless LAN security and IEEE 802.11i. Wireless Communications, IEEE, 2005. 12(1): p. 27-36.
    • (2005) Wireless Communications, IEEE , vol.12 , Issue.1 , pp. 27-36
    • Chen, J.1    Jiang, M.2    Liu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.