메뉴 건너뛰기




Volumn 15, Issue 3, 2007, Pages 237-255

A survey of wireless security

Author keywords

802.1x; AES; Authentication; Confidentiality; Deficiencies ofWEP; Integrity; RC4; Security threats to 802.11; TKIP; WEP protocol; WLAN safety improvements

Indexed keywords

AUTHENTICATION; INTERNET PROTOCOLS; NETWORK PROTOCOLS; SECURITY SYSTEMS; WIRELESS NETWORKS;

EID: 80052499574     PISSN: 13301136     EISSN: 18463908     Source Type: Journal    
DOI: 10.2498/cit.1000877     Document Type: Article
Times cited : (16)

References (34)
  • 1
    • 33745437561 scopus 로고    scopus 로고
    • A Survey of 802. 11a Wireless Security Threats and Security Mechanisms
    • United States Military Academy West Point, New York
    • J. WELCH, S. D. LATHROP, A Survey of 802. 11a Wireless Security Threats and Security Mechanisms. United States Military Academy West Point, New York, (2003). http://www. itoc. usma. edu/Documents/ITOC TR-2003-101 (G6). pdf
    • (2003)
    • Welch, J.1    Lathrop, S.D.2
  • 5
    • 85040695753 scopus 로고    scopus 로고
    • AUSCERTAA-2004. 02, Denial of Service Vulnerability in IEEE 802. 11 wireless devices
    • AUSCERTAA-2004. 02, Denial of Service Vulnerability in IEEE 802. 11 wireless devices. (2004). http://www. auscert. org. au/render. html? it=4091
    • (2004)
  • 6
    • 4544326203 scopus 로고    scopus 로고
    • ATrivial Denial of Service Attack on IEEE 802. 11 Direct Sequence Spread Spectrum Wireless LANS
    • IEEE Press
    • C. WULLEMS, K. THAM, J. SMITH, M. LOOI, ATrivial Denial of Service Attack on IEEE 802. 11 Direct Sequence Spread Spectrum Wireless LANS. IEEE Press, (2004), pp. 129-136
    • (2004) , pp. 129-136
    • Wullems, C.1    Tham, K.2    Smith, J.3    Looi, M.4
  • 7
    • 33751533202 scopus 로고    scopus 로고
    • Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack inWi-Fi Protected Access and IEEE 802. 11i
    • Hindawi Publishing Corporation
    • F. RANGO, D. C. LENTINI, S. MARANO, Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack inWi-Fi Protected Access and IEEE 802. 11i. EURASIP Journal on Wireless Communications and Networking, Hindawi Publishing Corporation, pp. 1-19, (2006)
    • (2006) EURASIP Journal on Wireless Communications and Networking , pp. 1-19
    • Rango, F.1    Lentini, D.C.2    Marano, S.3
  • 8
    • 34548171697 scopus 로고    scopus 로고
    • Holistic Approach to WEP Protocol in Securing Wireless Network Infrastructure
    • R. PRODANOVIC, D. SIMIC, Holistic Approach to WEP Protocol in Securing Wireless Network Infrastructure. Com SIS, Vol. 3, No. 2, pp. 97-113, (2006)
    • (2006) Com SIS , vol.3 , Issue.2 , pp. 97-113
    • Prodanovic, R.1    Simic, D.2
  • 11
    • 0002917345 scopus 로고    scopus 로고
    • Unsafe at any key size; An analysis of the WEP encapsulation
    • 802. 11-00/362./
    • J. R. WALKER, Unsafe at any key size; An analysis of the WEP encapsulation. IEEE Document 802. 11-00/362./, (2000)
    • (2000) IEEE Document
    • Walker, J.R.1
  • 13
    • 85040652497 scopus 로고    scopus 로고
    • WEP Fix using RC4 Fast Packet Keying. RSA Laboratories
    • WEP Fix using RC4 Fast Packet Keying. RSA Laboratories, (2002). http://www. comms. scitech. susx. ac. uk/fft/crypto/wep. pdf
    • (2002)
  • 14
    • 33748564575 scopus 로고    scopus 로고
    • Wi-Fi Protected Access: Strong, standards-based, interoperable security for today's Wi-Fi networks, Wi-Fi Alliance
    • Wi-Fi Protected Access: Strong, standards-based, interoperable security for today's Wi-Fi networks, Wi-Fi Alliance, (2003). http://www. wi-fi. org/opensection/pdf/whitepaper wi-fisecurity4-29-03. pdf
    • (2003)
  • 15
    • 85040705035 scopus 로고    scopus 로고
    • 802. 11 Security Series (Part II: The Temporal Key Integrity Protocol (TKIP)). Intel Corporation
    • J. R. WALKER, 802. 11 Security Series (Part II: The Temporal Key Integrity Protocol (TKIP)). Intel Corporation. http://cache-www. intel. com/cd/00/00/01/77/17769 80211 part2. pdf
    • Walker, J.R.1
  • 16
    • 11244298350 scopus 로고    scopus 로고
    • Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications
    • IEEE P802. 11i/D10. 0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications, (2004)
    • (2004)
  • 17
    • 85040678271 scopus 로고    scopus 로고
    • Some Remarks on the TKIP Key Mixing Function of IEEE 802. 11i
    • W. HAN, D. ZHENG, K. CHEN, Some Remarks on the TKIP Key Mixing Function of IEEE 802. 11i. Cryptology ePrint Archive, (2006). http://eprint. iacr. org/2006/129. pdf
    • (2006) Cryptology ePrint Archive
    • Han, W.1    Zheng, D.2    Chen, K.3
  • 21
    • 85040677357 scopus 로고    scopus 로고
    • Wireless Network Security 802. 11. Bluetooth and Handheld Devices, NIST
    • T. KARYGIANNIS, L. OWENS, Wireless Network Security 802. 11. Bluetooth and Handheld Devices, NIST, (2002). http://csrc. nist. gov/publications/nistpubs/800-48/nist sp 800-48. pdf
    • (2002)
    • Karygiannis, T.1    Owens, L.2
  • 22
  • 25
    • 84860573935 scopus 로고    scopus 로고
    • Honours Project, School of Computer Science, Carleton University
    • L. HAN, A Threat Analysis of The Extensible Authentication Protocol. Honours Project, School of Computer Science, Carleton University, (2006). http://www. scs. carleton. ca/barbeau/Honours/Lei Han. pdf
    • (2006) A Threat Analysis of The Extensible Authentication Protocol
    • Han, L.1
  • 26
    • 85040657216 scopus 로고    scopus 로고
    • 802. 11i: Robust and ready to go
    • L. PHIFER, 802. 11i: Robust and ready to go. (2004). http://searchmobilecomputing. techtarget. com/tip/1,289483,sid40 gci992741,00. html
    • (2004)
    • Phifer, L.1
  • 27
    • 85040701979 scopus 로고    scopus 로고
    • 802. 11i (How we got here and where are we headed). Orlando
    • E. PEREZ, 802. 11i (How we got here and where are we headed). Orlando, (2004). http://www. giac. org/practical/GSEC/Elio Perez GSEC. pdf
    • (2004)
    • Perez, E.1
  • 28
    • 85040706877 scopus 로고    scopus 로고
    • FIPS Pub197: Advanced Encryption Standard (AES)
    • NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, FIPS Pub197: Advanced Encryption Standard (AES), (2001)
    • (2001)
  • 30
    • 28344453256 scopus 로고    scopus 로고
    • Laguna Hills, CA: Aegean Park Press
    • I. KUMAR, Cryptology. Laguna Hills, CA: Aegean Park Press, (1997)
    • (1997) Cryptology
    • Kumar, I.1
  • 32
    • 85040670285 scopus 로고    scopus 로고
    • U. S. DoC/NIST, November 26
    • FIPS PUBLICATION 197, Advanced Encryption Standard (AES). U. S. DoC/NIST, November 26, (2001)
    • (2001)
  • 34
    • 85040703050 scopus 로고    scopus 로고
    • AES Proposal: Rijndael, Version 2. Submission to NIST, March
    • J. DAEMEN, V. RIJMEN, AES Proposal: Rijndael, Version 2. Submission to NIST, March (1999). http://csrc. nist. gov/encryption/aes
    • (1999)
    • Daemen, J.1    Rijmen, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.