Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch.
Loading Scinapse...
  • References (0)
  • Cited By (11)
References0
Cited By11
Published on Jan 1, 2006
Jeyanthi Hall7
Estimated H-index: 7
(Carleton University)
The need for robust access control mechanisms is paramount, especially in Wireless Local Area Network (WLAN)s and Wireless Wide Area Network (WWAN)s. Current authentication systems are vulnerable to device impersonation by rogue devices. Within cellular mobile networks, this threat is actualized by cloning cell phones, and using the clones for obtaining free services. A well known example in Wireless Fidelity (WiFi)/802.11 networks is Media Access Control (MAC) address spoofing. In this case, an...
18 Citations
Published on Jan 1, 2007
Minghui Shi10
Estimated H-index: 10
(University of Waterloo),
Humphrey Rutagemwa10
Estimated H-index: 10
(University of Waterloo)
+ 3 AuthorsChuang Lin33
Estimated H-index: 33
(Tsinghua University)
A wireless LAN service integration architecture based on current wireless LAN hotspots is proposed to make migrating to new service cost effective. The AAA (Authentication, Authorization and Accounting) based mobile terminal registration signaling process is discussed. An application layer end-to-end authentication and key negotiation protocol is proposed to overcome the open air connection problem existing in wireless LAN deployment. The protocol provides a general solution for Internet applica...
Source Cite
Song-Kong Chong1
Estimated H-index: 1
,
Hsien-Chu Wu1
Estimated H-index: 1
,
Chia-Chun Wu3
Estimated H-index: 3
Wired equivalent privacy encryption of IEEE 802.11 standard is based on the RC4 stream cipher, but the weakness in its Initialization Vector (IV) derivation causes the Key Scheduling Algorithm (KSA) of RC4 to leak out the information about the secret key. It is shared among the particular participants in the Wireless LAN (WLAN). Housley et al. proposed an Alternate Temporal Key Hash (ATKH) to solve the weakness of the KSA; they defeated the particular IV may make the KSA to leak out the informat...
3 Citations Source Cite
Published on Jan 1, 2007
Razvi Doomun4
Estimated H-index: 4
(University of Mauritius)
Published on Jan 1, 2005
Steve Glass4
Estimated H-index: 4
(Griffith University),
Vallipuram Muthukkumarasamy16
Estimated H-index: 16
This paper addresses denial of service vulnerabilities (DOS) in 802.11 wireless LANs that arise from the 802.11 distributed coordination function (DCF). We demonstrate that the DCF is vulnerable to equivalent DOS attacks at both the MAC and PHY layers. Denial of service attacks against the DCF are easily staged by a single adversary and affect both infrastructure and mobile ad hoc networks. These attacks are very effective and there are no workable counter-measures when using the standard MAC pr...
2 Citations
Published on May 1, 2004 in IEEE Symposium on Security and Privacy
David Johnston10
Estimated H-index: 10
(Intel),
Jesse Walker23
Estimated H-index: 23
(Intel)
When creating the new wireless communication standard IEEE 802.16, designers attempted to reuse a security scheme designed for wired media. The authors review the standard, enumerate its flaws, and outline changes that could defend it against threats.
186 Citations Source Cite
Published on Aug 1, 2004in ACM Transactions in Embedded Computing Systems 1.16
Taejoon Park15
Estimated H-index: 15
(University of Michigan),
Kang G. Shin80
Estimated H-index: 80
(University of Michigan)
Small low-cost sensor devices with limited resources are being used widely to build a self-organizing wireless network for various applications, such as situation monitoring and asset surveillance. Making such a sensor network secure is crucial to their intended applications, yet challenging due to the severe resource constraints in each sensor device. We present a lightweight security protocol (LiSP) that makes a tradeoff between security and resource consumption via efficient rekeying. The hea...
112 Citations Source Cite
Neil Smyth3
Estimated H-index: 3
,
Máire McLoone18
Estimated H-index: 18
,
John V. McCanny29
Estimated H-index: 29
A novel wireless local area network (WLAN) security processor is described in this paper. It is designed to offload security encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable hardware accelerator. The unique design, which comprises dedicated cryptographic instructions and hardware coprocessors, is capable of performing wired equivalent privacy, temporal key integrity protocol, counter mode with cipher block chaining m...
9 Citations Source Cite
View next paperUnsafe at any Speed