scinapse is loading now...
  • References (0)
  • Citations (49)
References0
Newest
Cited By49
Newest
Published on Aug 1, 2016
E. Venkat Reddy (Bundelkhand Institute of Engineering & Technology), K. Srinivasa Rao
This paper presents an integrated approach to resource utilization and security concern for wireless communication. In wireless communication, during the exchange of data, allocated spectrum and its utilization over a wireless channel plays an important role in providing efficient communication service in such network. In the need towards optimal resource utilization in wireless communication, a spectrum sensing and its utilization to higher resource optimization is suggested. The proposed commu...
Source Cite
Published on Sep 23, 2013
John R. Vacca1
Estimated H-index: 1
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wi...
2 Citations
Published on Jan 1, 2013
Andreas Klein10
Estimated H-index: 10
(Ghent University)
RC4 is a widely used cipher designed for 8-bit processors. It is part of the wireless LAN standards WEP and WPA. The chapter starts with the analysis of these protocols and show how protocol failures helps the attacker. Then we analyse RC4 in detail with a special focus on the weak key scheduling. We will learn how to break RC4 if carelessly used and we will learn how to use it in a secure way. We will also have a look on some variations of RC4 and see how to transfer attacks against RC4 to its ...
Source Cite
Published on Jan 1, 2013
Chao Yang10
Estimated H-index: 10
(Texas A&M University),
Guofei Gu32
Estimated H-index: 32
(Texas A&M University)
Wireless Local Area Networks (WLAN) allow end users to wirelessly access Internet with great convenience at home, work, or in public places. WLANs are currently being widely deployed in our real life with great success. However, it is still in its infant stage as long as security is concerned. In this chapter, we briefly overview the security issues in the Wireless Local Area Networks (WLAN). After a short introduction to the background of WLAN, we present WLAN security requirements and categori...
6 Citations Source Cite
Published on Jan 1, 2012in IEICE Transactions on Information and Systems 0.50
Yosuke Todo9
Estimated H-index: 9
(Kobe University),
Yuki Ozawa1
Estimated H-index: 1
(Kobe University)
+ 1 AuthorsMasakatu Morii14
Estimated H-index: 14
(Kobe University)
SUMMARY In this paper, we propose two new falsification attacks against Wi-Fi Protected Access Temporal Key Integrity Protocol (WPATKIP). A previous realistic attack succeeds only for a network that supports IEEE 802.11e QoS features by both an access point (AP) and a client, and it has an execution time of 12–15min, in which it recovers a message integrity code (MIC) key from an ARP packet. Our first attack reduces the execution time for recovering a MIC key. It can recover the MIC key within 7...
16 Citations Source Cite
Published on Aug 1, 2011
Dongsheng Yin1
Estimated H-index: 1
(Sun Yat-sen University),
Kai Cui1
Estimated H-index: 1
(Sun Yat-sen University)
Nowadays, WLANs has permeated through our daily lives. In fact, many companies are considering to abandon the wired LAN, because it's old-style and clumsy. People prefer to deploy a more flexible and convenient wireless LAN comparing to the traditional wired one. While people are enjoying the ease and agility brought by WLAN, a grave threat to your WLAN's security may be lying ahead because of the loopholes of itself. And if this cannot draw public's attention, severe consequences will definitel...
3 Citations Source Cite
Published on Jun 1, 2011
Kai Cui (Sun Yat-sen University), Dongsheng Yin1
Estimated H-index: 1
(Sun Yat-sen University)
As the era of mobile life has come, recently we can find WLANs everywhere. It's really convenient for people, but it may sometimes lead to disasters because that we neglect the security of them. And now that people are seeking for a securer, more reliable and more confidential wireless network. This study aims at the most common wireless network—WLAN, and researches its security aspect through a series of relative experiments in both WEP encrypted mode and WPA\WPA2 encrypted mode. And based on t...
Source Cite
Published on Apr 1, 2011
Wenjun Shi (Jilin University), Yuan Zhou (Jilin University)+ 3 AuthorsMeng Li (Jilin University)
Analyzing on WEP (Wired Equivalent Privacy) indicates many defects existing in security. A security policy of WLAN data transmission based on logistic chaotic modulation is presented. The improved Logistic mapping can carry information in the WLAN data frame through the change of single parameter μ, which can lead to morphological changes of chaotic attractors. The receiver decision device is used to restore the original signals at the recieving end. The results of simulation show that the propo...
Source Cite
Published on Jan 1, 2011
Public safety parties use wireless communications systems to enable emergency responders to communicate with each other as well as with the home department. Sensitive information is transported by emergency response systems. Therefore, emergency response systems need a strong security system to prevent information disclosure. Key management is the cornerstone of every security system and weak key management can lead to a decrease in security and performance. The academic literature on key manage...
Published on Jan 1, 2011in IEICE Transactions on Information and Systems 0.50
Masakatu Morii14
Estimated H-index: 14
(Kobe University),
Yosuke Todo9
Estimated H-index: 9
(Kobe University)
In recent years, wireless LAN systems are widely used in campuses, offices, homes and so on. It is important to discuss the security aspect of wireless LAN networks in order to protect data confidentiality and integrity. The IEEE Standards Association formulated some security protocols, for example, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP). However, these protocols have vulnerability for secure communication. In 2008, we proposed an eff...
8 Citations Source Cite