Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch.
Loading Scinapse...
  • References (0)
  • Cited By (49)
Cited By49
Published on Jan 1, 2003
Srivaths Ravi27
Estimated H-index: 27
(Princeton University),
Anand Raghunathan53
Estimated H-index: 53
(Princeton University)
+ 1 AuthorsSunil V. Hattangady22
Estimated H-index: 22
(Texas Instruments)
Realizing the visions of ubiquitous computing and communications, and ambient intelligence will require modern electronic and computing systems to pervade all aspects of our everyday lives. These systems are used to capture, manipulate, store and communicate a wide range of sensitive and personal information. It is, therefore, not surprising that security is emerging as a critical concern that must be addressed in order to enable these trends. Mobile appliances, which will play a critical role i...
Source Cite
Published on Jan 1, 2011
Public safety parties use wireless communications systems to enable emergency responders to communicate with each other as well as with the home department. Sensitive information is transported by emergency response systems. Therefore, emergency response systems need a strong security system to prevent information disclosure. Key management is the cornerstone of every security system and weak key management can lead to a decrease in security and performance. The academic literature on key manage...
Published on Jan 1, 2004
Phongsak Prasithsangaree8
Estimated H-index: 8
Prashant Krishnamurthy26
Estimated H-index: 26
(University of Pittsburgh)
Several schemes have been proposed for authenticating both the network and the mobile stations to one another in public access wireless networks. In this paper, we look at the weaknesses of such schemes and enumerate a set of four constraints for authentication in public access wireless networks. We then propose two authentication protocols that can overcome these weaknesses while satisfying the constraints. The first proposed protocol provides additional direct authentication to wireless client...
Nicolas Sklavos20
Estimated H-index: 20
(University of Patras),
Panagiotis Souras1
Estimated H-index: 1
(University of Patras)
Security is one of the most important issues in computer networks. A common view of networks security is based on technical measures. Cryptographic models, firewalls and intrusion detection models are implemented in every information framework of an organization. Although deployment of such technologies may reduce security vulnerabilities and losses from security breaches, it is not clear to organizations how much they must invest in information security. In this article, common approaches of ec...
18 Citations Source Cite
Published on Jan 1, 2007
Minghui Shi10
Estimated H-index: 10
(University of Waterloo),
Humphrey Rutagemwa10
Estimated H-index: 10
(University of Waterloo)
+ 3 AuthorsChuang Lin33
Estimated H-index: 33
(Tsinghua University)
A wireless LAN service integration architecture based on current wireless LAN hotspots is proposed to make migrating to new service cost effective. The AAA (Authentication, Authorization and Accounting) based mobile terminal registration signaling process is discussed. An application layer end-to-end authentication and key negotiation protocol is proposed to overcome the open air connection problem existing in wireless LAN deployment. The protocol provides a general solution for Internet applica...
Source Cite
Published on Jan 1, 2009
Anjum Naveed6
Estimated H-index: 6
(University of New South Wales),
Salil S. Kanhere30
Estimated H-index: 30
(University of New South Wales)
The security services of authentication and confidentiality are of significant importance to ensure secure communication in any network. The decentralized nature and the broadcast medium of communication of wireless ad hoc networks results in unique challenges in realizing the services of authentication and data confidentiality. In this chapter, We first highlight the issues relating to authentication and confidentiality in wireless ad hoc networks and identify the characteristics of these servi...
Published on Jan 1, 2013
Andreas Klein10
Estimated H-index: 10
(Ghent University)
RC4 is a widely used cipher designed for 8-bit processors. It is part of the wireless LAN standards WEP and WPA. The chapter starts with the analysis of these protocols and show how protocol failures helps the attacker. Then we analyse RC4 in detail with a special focus on the weak key scheduling. We will learn how to break RC4 if carelessly used and we will learn how to use it in a secure way. We will also have a look on some variations of RC4 and see how to transfer attacks against RC4 to its ...
Source Cite
Published on Jan 1, 2007
Published on Jan 1, 2005
Changhua He5
Estimated H-index: 5
(Stanford University),
John C. Mitchell77
Estimated H-index: 77
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model, 802.11i appears to provide effective data confidentiality and integrity when CCMP is used. Furthermore, 802.11i may provide satisfactory mutual authentication and key management, although there are some potential implementation oversights that may cause severe problems. Since the 802.11i design does not emphasize avail...
188 Citations
Published on Jan 1, 2003 in IEEE Symposium on Security and Privacy
Nick L. Petroni Jr.9
Estimated H-index: 9
(University of Maryland, College Park),
William A. Arbaugh36
Estimated H-index: 36
(University of Maryland, College Park)
Mitigating design flaws often provides the only means to protect legacy equipment, particularly in wireless local area networks. A synchronous active attack against the wired equivalent privacy protocol demonstrates how mitigating one flaw or attack can facilitate another.
11 Citations Source Cite
View next paperIntercepting mobile communications: the insecurity of 802.11