메뉴 건너뛰기




Volumn , Issue , 2011, Pages 158-162

A novel cost effective authentication framework for Wireless LANs in small medium enterprises (SMEs)

Author keywords

Computer Security; User Authentication; WEP; Wireless LAN; WLAN Security Frameworks

Indexed keywords

COST EFFECTIVE; CRYPTOGRAPHIC ALGORITHMS; FINANCIAL CONSTRAINTS; PROCESSING CYCLES; SECURITY MECHANISM; SECURITY SOLUTIONS; SMALL MEDIUM ENTERPRISE; USER AUTHENTICATION; WEP; WIRELESS COMMUNICATIONS; WLAN SECURITY;

EID: 80053168096     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCSN.2011.6014695     Document Type: Conference Paper
Times cited : (2)

References (24)
  • 1
    • 0038675422 scopus 로고    scopus 로고
    • Authenticity in a reliable protocol for mobile computing
    • Melbourne, Florida, March 09 - 12, 2003). SAC '03. ACM, New York, NY. DOI
    • De Francesco, N. and Petrocchi, M. 2003. Authenticity in a reliable protocol for mobile computing. In Proceedings of the 2003 ACM Symposium on Applied Computing (Melbourne, Florida, March 09 - 12, 2003). SAC '03. ACM, New York, NY, 318-324. DOI: http://doi.acm.org/10.1145/952532.952597
    • (2003) Proceedings of the 2003 ACM Symposium on Applied Computing , pp. 318-324
    • De Francesco, N.1    Petrocchi, M.2
  • 2
    • 67650668236 scopus 로고    scopus 로고
    • Performance analysis of evolving wireless IEEE 802.ll security architectures
    • Yilan, Taiwan, September 10 - 12, 2008). Mobility '08. ACM, New York, NY. DOI
    • Gin, A. and Hunt, R. 2008. Performance analysis of evolving wireless IEEE 802.ll security architectures. In Proceedings of the international Conference on Mobile Technology, Applications, and Systems (Yilan, Taiwan, September 10 - 12, 2008). Mobility '08. ACM, New York, NY, 1-6. DOI: http://doi.acm.org/10. 1145/1506270.1506393
    • (2008) Proceedings of the International Conference on Mobile Technology, Applications, and Systems , pp. 1-6
    • Gin, A.1    Hunt, R.2
  • 3
    • 44049102284 scopus 로고    scopus 로고
    • Encryption as an effective tool in reducing wireless LAN vulnerabilities
    • Fifth International Conference on Information Technology: New Generations (itng 2008)
    • Jiang Li, Moses Gamba, "Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities," itng, pp.557-562, Fifth International Conference on Information Technology: New Generations (itng 2008), 2008
    • (2008) Itng , pp. 557-562
    • Li, J.1    Gamba, M.2
  • 4
    • 11244278744 scopus 로고    scopus 로고
    • Analysis of the 802.lli 4-way handshake
    • Philadelphia, PA, USA, October 01 - 01, 2004). WiSe '04. ACM, New York, NY. DOI
    • He, C. and Mitchell, J. C. 2004. Analysis of the 802.lli 4-way handshake. In Proceedings of the 3rd ACM Workshop on Wireless Security (Philadelphia, PA, USA, October 01 - 01, 2004). WiSe '04. ACM, New York, NY,43-0.DOI: http://doi.acm.org/10.1145/1023646.1023655Jhj
    • (2004) Proceedings of the 3rd ACM Workshop on Wireless Security , pp. 43-0
    • He, C.1    Mitchell, J.C.2
  • 5
    • 85008006368 scopus 로고    scopus 로고
    • Will IEEE 802.1X Finally Take off in 2008?
    • Mar. doi: 10.11 091MC.2008.103
    • Neal Leavitt, "Will IEEE 802.1X Finally Take Off in 2008?," Computer, vol. 41, no. 3, pp. 12-15, Mar. 2008, doi: 10.11 091MC.2008.103
    • (2008) Computer , vol.41 , Issue.3 , pp. 12-15
    • Leavitt, N.1
  • 6
    • 70350555292 scopus 로고    scopus 로고
    • Research on authentication security of wireless local area network based on L2TP protocol
    • 2009 lIT A International Conference on Services Science, Management and Engineering
    • Yan Niu, Jun Li, Lala Li, "Research on Authentication Security of Wireless Local Area Network Based on L2TP Protocol," ssme, pp.491-494, 2009 lIT A International Conference on Services Science, Management and Engineering, 2009
    • (2009) Ssme , pp. 491-494
    • Niu, Y.1    Li, J.2    Li, L.3
  • 8
    • 37649032986 scopus 로고    scopus 로고
    • IMEWAS-A integrated multi-platform EAPoW-based WLAN AAA solution
    • Third International Conference on Wireless and Mobile Communications (ICWMC'07)
    • Ling Chen, Jian-de Lu, "IMEWAS-A Integrated Multi-platform EAPoW-Based WLAN AAA Solution," icwmc, pp.17, Third International Conference on Wireless and Mobile Communications (ICWMC'07), 2007
    • (2007) Icwmc , pp. 17
    • Chen, L.1    Lu, J.-D.2
  • 9
    • 33750961614 scopus 로고    scopus 로고
    • Choosing the right wireless LAN security protocol for the home and business user
    • First International Conference on Availability, Reliability and Security (ARES'06)
    • Carsten Maple, Helen Jacobs, Matthew Reeve, "Choosing the Right Wireless LAN Security Protocol for the Home and Business User," ares, pp.1025-1032, First International Conference on Availability, Reliability and Security (ARES'06), 2006
    • (2006) Ares , pp. 1025-1032
    • Maple, C.1    Jacobs, H.2    Reeve, M.3
  • 10
    • 46849088783 scopus 로고    scopus 로고
    • Critical review of unsecured WEP
    • 2007 IEEE Congress on Services (Services 2007)
    • Songhe Zhao, Charles A. Shoniregun, "CriticaJ Review of Unsecured WEP," services, pp.368-374, 2007 IEEE Congress on Services (Services 2007), 2007.
    • (2007) Services , pp. 368-374
    • Zhao, S.1    Shoniregun, C.A.2
  • 11
    • 0036983653 scopus 로고    scopus 로고
    • DoS and authentication in wireless public access networks
    • (Atlanta, GA, USA, September 28 28, 2002). WiSE '02. ACM, New York, NY, 47-56. DOI
    • Faria, D. B. and Cheriton, D. R. 2002. DoS and authentication in wireless public access networks. In Proceedings of the 1st ACM Workshop on Wireless Security (Atlanta, GA, USA, September 28 28, 2002). WiSE '02. ACM, New York, NY, 47-56. DOI: http://doi.acm.org/10.1145/570681. 570687
    • (2002) Proceedings of the 1st ACM Workshop on Wireless Security , pp. 570687
    • Faria, D.B.1    Cheriton, D.R.2
  • 12
    • 0035395659 scopus 로고    scopus 로고
    • Facing the challenge of wireless security
    • July, doi:10.1109/2.933495
    • Sandra Kay Miller, "Facing the Challenge of Wireless Security," Computer, vol. 34, no. 7, pp. 16-18, July 2001, doi:10.1109/2.933495
    • (2001) Computer , vol.34 , Issue.7 , pp. 16-18
    • Miller, S.K.1
  • 13
    • 0142103302 scopus 로고    scopus 로고
    • Park derrick dicoi WLAN security: Current and future
    • Sept., doi: 10.11 091MIC.2003.1232519
    • Joon S. Park, Derrick Dicoi, "WLAN Security: Current and Future," IEEE Internet Computing, vol. 7, no. 5, pp. 60-65, Sept. 2003, doi: 10.11 091MIC.2003.1232519
    • (2003) IEEE Internet Computing , vol.7 , Issue.5 , pp. 60-65
    • Joon, S.1
  • 14
    • 34548124975 scopus 로고    scopus 로고
    • Secure network authentication with passtext
    • International Conference on Information Technology (ITNG'07)
    • Roman V. Yampolskiy, "Secure Network Authentication with PassText," itng, pp.831-836, International Conference on Information Technology (ITNG'07), 2007
    • (2007) Itng , pp. 831-836
    • Yampolskiy, R.V.1
  • 15
    • 0542400928 scopus 로고    scopus 로고
    • Techniques for authentication protocols and key distribution on wireless ATM networks
    • Oct. 1998
    • Patiyoot, D. and Shepherd, S. J. 1998. Techniques for authentication protocols and key distribution on wireless ATM networks. SIGOPS Oper. Syst. Rev. 32, 4 (Oct. 1998), 25-32. DOI: http://doi.acm.org/10.1145/302350.302357
    • (1998) SIGOPS Oper. Syst. Rev. , vol.32 , Issue.4 , pp. 25-32
    • Patiyoot, D.1    Shepherd, S.J.2
  • 16
    • 80053134876 scopus 로고    scopus 로고
    • A new scheme for wireless network authentication system
    • International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06)
    • Jing Zhang, Bo Wang, "A New Scheme For Wireless Network Authentication System," icniconsmcl, pp.133, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06), 2006
    • (2006) Icniconsmcl , pp. 133
    • Zhang, J.1    Wang, B.2
  • 17
    • 0037673434 scopus 로고    scopus 로고
    • Securing a wireless network
    • (Providence, Rhode Island, USA, November 20 - 23, 2002). SIGUCCS '02. ACM, New York, NY. DOI
    • Allen, J. and Wilson, J. 2002. Securing a wireless network. In Proceedings of the 30th Annual ACM SIGUCCS Conference on User Services (Providence, Rhode Island, USA, November 20 - 23, 2002). SIGUCCS '02. ACM, New York, NY, 213-215. DOI: http://doi.acm.org/10.1145/588646.588696
    • (2002) Proceedings of the 30th Annual ACM SIGUCCS Conference on User Services , pp. 213-215
    • Allen, J.1    Wilson, J.2
  • 19
    • 48349106601 scopus 로고    scopus 로고
    • A study on MITM (Man in the Middle) vulnerability in wireless network Using 802.1X and EAP
    • 2008 International Conference on Information Science and Security (ICISS 2008)
    • Hyunuk Hwang, Gyeok Jung, Kiwook Sohn, Sangseo Park, "A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP," iciss, pp.164-170, 2008 International Conference on Information Science and Security (ICISS 2008), 2008
    • (2008) Iciss , pp. 164-170
    • Hwang, H.1    Jung, G.2    Sohn, K.3    Park, S.4
  • 20
    • 23944451334 scopus 로고    scopus 로고
    • Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network
    • (Baltimore, MD, USA, October 10 - 13, 2004). SIGUCCS '04. ACM, New York, NY. DOI
    • Brawn, S. K., Koan, R. M., and Caye, K. 2004. Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network. In Proceedings of the 32nd Annual ACM SIGUCCS Fall Conference (Baltimore, MD, USA, October 10 - 13, 2004). SIGUCCS '04. ACM, New York, NY, 273-277. DOI: http://doi.acm.org/10.ll45/1027802. 1027864
    • (2004) Proceedings of the 32nd Annual ACM SIGUCCS Fall Conference , pp. 273-277
    • Brawn, S.K.1    Koan, R.M.2    Caye, K.3
  • 21
    • 57849148618 scopus 로고    scopus 로고
    • Designs of a secure wireless LAN access technique and an intrusion detection system for home network
    • 2008 Fourth International Conference on Networked Computing and Advanced Information Management
    • Tae-Sub Kim, Yi-Kang Kim, Byung-Bog Lee, Seung-Wan Ryu, Choong-Ho Cho, "Designs of a Secure Wireless LAN Access Technique and an Intrusion Detection System for Home Network," ncm, vol. 1, pp.318-324, 2008 Fourth International Conference on Networked Computing and Advanced Information Management, 2008
    • (2008) Ncm , vol.1 , pp. 318-324
    • Kim, T.-S.1    Kim, Y.-K.2    Lee, B.-B.3    Ryu, S.-W.4    Cho, C.-H.5
  • 22
    • 3042555130 scopus 로고    scopus 로고
    • A secure wireless LAN system retaining privacy
    • 18th International Conference on Advanced Information Networking and Applications (AINA'04) Volume 2
    • Tadashi Komori, Takamichi Saito, "A Secure Wireless LAN System Retaining Privacy," aina, vol. 2, pp.370, 18th International Conference on Advanced Information Networking and Applications (AINA'04) Volume 2, 2004
    • (2004) Aina , vol.2 , pp. 370
    • Komori, T.1    Saito, T.2
  • 23
    • 56749092209 scopus 로고    scopus 로고
    • Wireless authentication using remote passwords
    • (Alexandria, VA, USA, March 31 - April 02, 2008). WiSec '08. ACM, New York, NY. DOI
    • Harding, A., van der Horst, T. W., and Seamons, K. E. 2008. Wireless authentication using remote passwords. In Proceedings of the First ACM Conference on Wireless Network Security (Alexandria, VA, USA, March 31 - April 02, 2008). WiSec '08. ACM, New York, NY, 24-29 .DOI : http://doi.acm.org/10. 1145/13 5Bhayavati33 .13 5Bhagy avati38.
    • (2008) Proceedings of the First ACM Conference on Wireless Network Security , pp. 24-29
    • Harding, A.1    Van Der Horst, T.W.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.