메뉴 건너뛰기




Volumn 15, Issue 6, 2013, Pages 420-436

A comparison of security in wireless network standards with a focus on bluetooth, WiFi and WiMAX

Author keywords

Bluetooth; WiFi; WiMAX; Wireless network security

Indexed keywords

CRITICAL APPLICATIONS; DESIGN FAULTS; IEEE 802.11S; LOCAL AREAS; NETWORK STANDARDS; SECURITY MECHANISM; WIFI AND WIMAX; WORK STANDARDS;

EID: 84886549636     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (35)
  • 1
    • 0141981548 scopus 로고    scopus 로고
    • IEEE standards for information technology telecommunications and information exchange be- tween systems local and metropolitan area network specific requirements part 11: Wireless lan medium access control
    • IEEE 802.11 1999 Edition ISO/IEC 8802-11: 1999, IEEE
    • IEEE standards for information technology telecommunications and information exchange be- tween systems local and metropolitan area network specific requirements part 11: Wireless lan medium access control,". IEEE 802.11 1999 Edition ISO/IEC 8802-11: 1999, IEEE, 1999.
    • (1999)
  • 2
    • 0009733423 scopus 로고    scopus 로고
    • IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed broadband wireless access systems
    • Tech. Rep. 802.16-2001, IEEE
    • IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed broadband wireless access systems,". Tech. Rep. 802.16-2001, IEEE, 2001.
    • (2001)
  • 3
    • 84886488149 scopus 로고    scopus 로고
    • IEEE standard for information technology telecom- munications and information exchange between sys- tem local and metropolitan area networks specific requirements part 11: Wireless LAN
    • IEEE
    • "IEEE standard for information technology telecom- munications and information exchange between sys- tem local and metropolitan area networks specific requirements part 11: Wireless LAN,". tech. rep., IEEE, 2004.
    • (2004) tech. rep.
  • 4
    • 0009733423 scopus 로고    scopus 로고
    • IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed broadband wireless access systems
    • Tech. Rep. 802.16-2004, IEEE
    • "IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed broadband wireless access systems,". Tech. Rep. 802.16-2004, IEEE, 2004.
    • (2004)
  • 5
    • 34248646352 scopus 로고    scopus 로고
    • IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed and mobile broadband wireless access systems amendment 2: Physical andmedium access control layers for com- bined fixed
    • IEEE
    • "IEEE standard for local and metropolitan area net- works part 16: Air interface for fixed and mobile broadband wireless access systems amendment 2: Physical andmedium access control layers for com- bined fixed,". tech. rep., IEEE, 2005.
    • (2005) tech. rep.
  • 6
    • 73449101405 scopus 로고    scopus 로고
    • IEEE standard for local and metropolitan area net- works part 16: Air interface for broadband wireless access systems amendment 1: Multiple relay specifi- cation
    • IEEE
    • "IEEE standard for local and metropolitan area net- works part 16: Air interface for broadband wireless access systems amendment 1: Multiple relay specifi- cation,". tech. rep., IEEE, 2009.
    • (2009) tech. rep.
  • 7
    • 34250839908 scopus 로고    scopus 로고
    • Authentication authorization and accounting (AAA) schemes in wimax
    • in 2006 IEEE Interna-tional Conference on Electro/Information Technol-ogy, May 2006.
    • S. Adibi, B. Lin, P.H. Ho, G. Agnew, and S. Er- fani, "Authentication authorization and accounting (AAA) schemes in wimax," in 2006 IEEE Interna- tional Conference on Electro/Information Technol- ogy, pp. 210-215, May 2006.
    • Adibi, S.1    Lin, B.2    Ho, P.H.3    Agnew, G.4    Er-fani, S.5
  • 8
    • 84886474108 scopus 로고    scopus 로고
    • Mobile wimax security
    • Airspan.
    • Airspan. "Mobile wimax security,". tech. rep., 2007.
    • (2007) tech. rep.
  • 9
    • 33845535776 scopus 로고    scopus 로고
    • Extensible authentication protocol (EAP) method requirements for wireless lan
    • Tech. Rep. RFC 4017.
    • D. Stanley andJ. Walker and B. Aboba. "Extensible authentication protocol (EAP) method requirements for wireless lan,". Tech. Rep. RFC 4017.
    • Stanley, D.1    Walker, J.2    Aboba, B.3
  • 11
    • 0034777649 scopus 로고    scopus 로고
    • Inter-cepting mobile communications: The insecurity of 802.11
    • in International Conference on Mobile Com-puting and Networking
    • N. Borisov, I. Goldberg, and D. Wagner, "Inter-cepting mobile communications: The insecurity of 802.11," in International Conference on Mobile Com-puting and Networking, pp. 180, 2001.
    • (2001) , pp. 180
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 12
    • 77950684579 scopus 로고    scopus 로고
    • Taming the blue beast: A survey of bluetooth based threats
    • J. Dunning, "Taming the blue beast: A survey of bluetooth based threats," IEEE Security & Privacy Magazine, vol. 8, no. 2, pp. 20-27, 2010.
    • (2010) IEEE Security & Privacy Magazine , vol.8 , Issue.2 , pp. 20-27
    • Dunning, J.1
  • 13
    • 33750125870 scopus 로고    scopus 로고
    • Formal verification of the IEEE 802.11i wlan se-curity protocol
    • in Australian Software Engineering Conference (ASWEC '06)
    • S. Zafar E. Sithirasenan and V. Muthukkumarasamy, "Formal verification of the IEEE 802.11i wlan se-curity protocol," in Australian Software Engineering Conference (ASWEC '06), pp. 181-190, 2006.
    • (2006) , pp. 181-190
    • Zafar, S.1    Sithirasenan, E.2    Muthukkumarasamy, V.3
  • 14
    • 7544234721 scopus 로고    scopus 로고
    • Michael: An improved MIC for 802.11 WEP
    • IEEE
    • N. Ferguson. "Michael: An improved MIC for 802.11 WEP,". tech. rep., IEEE, 2002.
    • (2002) tech. rep.
    • Ferguson, N.1
  • 15
    • 28344447554 scopus 로고    scopus 로고
    • Enhanced WEP: An ef-ficient solution to WEP threats
    • in Second IFIP International Conference on Wireless and Optical Communications Networks
    • H. Hassan and Y. Challal, "Enhanced WEP: An ef-ficient solution to WEP threats," in Second IFIP International Conference on Wireless and Optical Communications Networks, pp. 594-599, 2005.
    • (2005) , pp. 594-599
    • Hassan, H.1    Challal, Y.2
  • 17
    • 84886503568 scopus 로고    scopus 로고
    • Observations on the message integrity code in IEEE802.11 wireless LANs
    • J. Huang, W. Susilo, and J. Seberry. "Observations on the message integrity code in IEEE802.11 wireless LANs,". tech. rep., 2008.
    • (2008) tech. rep.
    • Huang, J.1    Susilo, W.2    Seberry, J.3
  • 18
    • 84886479895 scopus 로고    scopus 로고
    • On the security of the IEEE 802.11i message integrity code michael
    • J. Huang, W. Susilo, J. Seberry, and M. Bunder. "On the security of the IEEE 802.11i message integrity code michael,". tech. rep., 2004.
    • (2004) tech. rep.
    • Huang, J.1    Susilo, W.2    Seberry, J.3    Bunder, M.4
  • 21
    • 47749085463 scopus 로고    scopus 로고
    • Attacks on the rc4 stream cipher
    • A. Klein, "Attacks on the rc4 stream cipher," De-signs, Codes and Cryptography, vol. 48, no. 3, p. 269, 2008.
    • (2008) De-signs, Codes and Cryptography , vol.48 , Issue.3 , pp. 269
    • Klein, A.1
  • 22
    • 84886535968 scopus 로고    scopus 로고
    • Pkcs #1: Rsa cryptography stan-dard
    • RSA Laboratories
    • R. Laboratories. "Pkcs #1: Rsa cryptography stan-dard,". tech. rep., RSA Laboratories.
    • tech. rep.
    • Laboratories, R.1
  • 23
    • 70349693933 scopus 로고    scopus 로고
    • A simple encryption scheme based on wimax
    • in 2009 International Conference on E-Business and Information System Security, , May 2009.
    • C. Luo, "A simple encryption scheme based on wimax," in 2009 International Conference on E-Business and Information System Security, pp. 1-4, May 2009.
    • Luo, C.1
  • 24
    • 38549178532 scopus 로고    scopus 로고
    • Security analysis of IEEE 802.16
    • in 2007 IEEE Interna-tional Conference on Communications, Glasgow, June 2007.
    • L. Maccari, M. Paoli, and R. Fantacci, "Security analysis of IEEE 802.16," in 2007 IEEE Interna-tional Conference on Communications, pp. 1160-1165, Glasgow, June 2007.
    • Maccari, L.1    Paoli, M.2    Fantacci, R.3
  • 25
    • 44249089502 scopus 로고    scopus 로고
    • Computer and Communication Networks
    • Prentice Hall
    • N. F. Mir, Computer and Communication Networks. Prentice Hall, 2006.
    • (2006)
    • Mir, N.F.1
  • 26
    • 84886572349 scopus 로고    scopus 로고
    • New e±cient rf fingerprint-based secu-rity solution for bluetooth secure simple pairing
    • S. Pasanen, "New e±cient rf fingerprint-based secu-rity solution for bluetooth secure simple pairing," Se-curity, pp. 1-8, 2010.
    • (2010) Se-curity , pp. 1-8
    • Pasanen, S.1
  • 29
    • 77953838402 scopus 로고    scopus 로고
    • Cracking the bluetooth pin
    • in Proceedings of the 3rd International Confer-ence on Mobile Systems
    • Y. Shaked and A. Wool, "Cracking the bluetooth pin," in Proceedings of the 3rd International Confer-ence on Mobile Systems, Applications, and Services, pp. 39-50, 2005.
    • (2005) Applications, and Services , pp. 39-50
    • Shaked, Y.1    Wool, A.2
  • 30
    • 84861608869 scopus 로고    scopus 로고
    • Study and Design of a Security Archi-tecture for Wireless Personal Area Networks
    • PhD thesis, KU Leuven
    • D. Singelee. Study and Design of a Security Archi-tecture for Wireless Personal Area Networks. PhD thesis, KU Leuven, 2008.
    • (2008)
    • Singelee, D.1
  • 31
    • 38549101578 scopus 로고    scopus 로고
    • Break-ing 104 bit WEP in less than 60 seconds
    • in Pro-ceedings of the 8th International Conference on In-formation Security Applications
    • E. Tews, R. P. Weinmann, and A. Pyshkin, "Break-ing 104 bit WEP in less than 60 seconds," in Pro-ceedings of the 8th International Conference on In-formation Security Applications, pp. 188-202, 2007.
    • (2007) , pp. 188-202
    • Tews, E.1    Weinmann, R.P.2    Pyshkin, A.3
  • 32
    • 0041602326 scopus 로고    scopus 로고
    • Introduction to Cryptography with Coding Theory (2nd Edition)
    • Prentice Hall
    • W. Trappe and L. C. Washington, Introduction to Cryptography with Coding Theory (2nd Edition). Prentice Hall, 2005.
    • (2005)
    • Trappe, W.1    Washington, L.C.2
  • 33
    • 7544239419 scopus 로고    scopus 로고
    • A note on the fragility of the michael mes-sage integrity code
    • A. Wool, "A note on the fragility of the michael mes-sage integrity code," IEEE Transactions on Wireless Communications, vol. 3, no. 5, pp. 1459-1462, 2004.
    • (2004) IEEE Transactions on Wireless Communications , vol.3 , Issue.5 , pp. 1459-1462
    • Wool, A.1
  • 35
    • 35148814392 scopus 로고    scopus 로고
    • Security of IEEE 802.16 in mesh mode
    • Oct. 2006
    • Y. Zhou and Y. Fang, "Security of IEEE 802.16 in mesh mode," in MILCOM 2006, pp. 1-6, Oct. 2006.
    • in MILCOM 2006 , pp. 1-6
    • Zhou, Y.1    Fang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.