Jyh‐Cheng Chen, Ming-Chia Jiang, Yiwen Liu,
... key management in 802.11i is discussed. Because 802.11i incorporates IEEE 802.1X as its authentication enhancement, 802.1X ...
Tópico(s): Wireless Communication Networks Research
2005 - Institute of Electrical and Electronics Engineers | IEEE Wireless Communications
IEEE 802.11i is the IEEE standard that provides enhanced MAC security and has been widely used in wireless networks and Internet of ... and verification approach based on timed automata for IEEE 802.11i protocol, using the UPPAAL model checker, to check correctness of the changes in IEEE 802.11i protocol and provide better security.
Tópico(s): Security and Verification in Computing
2018 - World Scientific | International Journal of Software Engineering and Knowledge Engineering
... that address growing wireless network security problems. The 802.11i IEEE draft standard provides next-generation authentication, authorization, and encryption capabilities. The WiFi Alliance, a wireless industry organization, has jumped the gun and created the WiFi Protected Access (WPA) standard, a subset of the 802.11i draft. These new standards are more complicated than ...
Tópico(s): Wireless Networks and Protocols
2003 - Institute of Electrical and Electronics Engineers | IEEE Security & Privacy
Li Wang, Bala Srinivasan, Nandita Bhattacharjee,
IEEE 802.11i standard defines the security specifications of IEEE 802.11 series Wireless Local Area Network (WLAN). It ... the availability aspect. Many researchers have shown that IEEE 802.11i standard cannot prevent various Denial of Service (DoS) ... authentication, disassociation and memory/CPU DoS attacks. Besides, IEEE 802.11i reserved the PSK mode of WEP for flexibility and backward compatibility. However, the PSK mode in IEEE 802.11i standard fails to provide sufficient security to prevent ... we present our solutions which can effectively improve IEEE 802.11i. For memory/CPU DoS attack against 4-way ...
Tópico(s): Cryptography and Data Security
2011 - Academy Publisher | Journal of Networks
Rajeev Singh, Teek Parval Sharma,
Abstract The IEEE 802.11i standard provides authentication and security at the Medium Access Control layer in wireless local area networks (WLANs). It ... learn about the attacks and their solutions in IEEE 802.11i‐protected WLANs so that future research proposals and ... DoS attacks and existing solutions pertaining to the IEEE 802.11i security standard. Copyright © 2014 John Wiley & Sons, Ltd.
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2014 - Hindawi Publishing Corporation | Security and Communication Networks
Floriano De Rango, Dionigi Cristian Lentini, S. Marano,
This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS ... time in comparison with the standard WPA and IEEE 802.11i protocols. However, if the mobile device presents different ...
Tópico(s): Wireless Networks and Protocols
2006 - Springer Nature | EURASIP Journal on Wireless Communications and Networking
Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Oh-Young Song,
Tópico(s): Telecommunications and Broadcasting Technologies
2005 - Springer Science+Business Media | Lecture notes in computer science
... a stream cipher (RC4) for encryption. The latest IEEE 802.11i draft addresses this, and other, weaknesses discovered in WEP. IEEE 802.11i suggests three new modes of operation: two based ...
Tópico(s): Wireless Networks and Protocols
2004 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Wireless Communications
Jianyong Huang, Jennifer Seberry, Willy Susilo, M. W. Bunder,
The latest IEEE 802.11i uses a keyed hash function, called Michael, as the message integrity code. This paper describes some properties and ...
Tópico(s): Cryptographic Implementations and Security
2005 - Springer Science+Business Media | Lecture notes in computer science
Ignacio Algredo‐Badillo, Claudia Feregrino-Uribe, René Cumplido, Miguel Morales‐Sandoval,
... the basis for the security architecture of the IEEE 802.11i standard. AES-CCMP is based on the AES- ...
Tópico(s): Opportunistic and Delay-Tolerant Networks
2010 - Elsevier BV | Computers & Electrical Engineering
Ralf Küsters, Max Tuengerthal,
... protocols, such as SSL/TLS, SSH, IPsec, DNSSEC, IEEE 802.11i, and Kerberos, derive new keys from other keys. ... method to analyze two central protocols of the IEEE 802.11i standard, namely the 4-Way Handshake Protocol and ...
Tópico(s): Cryptographic Implementations and Security
2011 - Springer Science+Business Media | Lecture notes in computer science
Duhyun Bae, Jiho Kim, Sehyun Park, Oh-Young Song,
... In this paper, we propose a design of IEEE 802.11i hardware architecture to support these new MAC mechanisms. ...
Tópico(s): Cooperative Communication and Network Coding
2005 - Springer Science+Business Media | Lecture notes in computer science
Mohamad Sbeiti, Niklas Goddemeier, Daniel Behnke, Christian Wietfeld,
... the UAVs. Contemporary security standards, such as the IEEE 802.11i and the security mechanisms of the IEEE 802.11s mesh standard, are vulnerable to routing ...
Tópico(s): Opportunistic and Delay-Tolerant Networks
2015 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Wireless Communications
Kuang-Hui Chi, Yung‐Chien Shih, Ho‐Han Liu, Jui-Tang Wang, Shiao‐Li Tsao, Chien‐Chao Tseng,
... or achieves comparable performance resulting from the counterpart IEEE 802.11i scheme with high likelihood of 70%-85% successful ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2010 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Vehicular Technology
Elankayer Sithirasenan, Vallipuram Muthukkumarasamy,
... reliable security mechanism. The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for authentication, authorization and key ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2007 - Institute of Electrical and Electronics Engineers | The ... IEEE International Conference on Networks/The IEEE International Conference on Networks
IEEE 802.11i is the IEEE standard that provides enhanced MAC security and has been widely used in wireless networks and Internet of ... and verification approach based on timed automata for IEEE 802.11i protocol, using the UPPAAL model checker, to check correctness of the changes in IEEE 802.11i protocol and provide better security.
Tópico(s): Access Control and Trust
2018 - | Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering
To improve authentication robustness, IEEE 802.11i adds the need for an authentication server to the standard. It also implements a two-way authentication method to prevent the man-in-the-middle attacks that have been so prevalent on IEEE 802.11b networks.
Tópico(s): Wireless Networks and Protocols
2003 - Institute of Electrical and Electronics Engineers | IEEE Potentials
Anupam Datta, Ante Đerek, John C. Mitchell, Arnab Roy,
... a number of industry standards including SSL/TLS, IEEE 802.11i and Kerberos V5.
Tópico(s): Cryptographic Implementations and Security
2007 - Elsevier BV | Electronic Notes in Theoretical Computer Science
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realization of fast and secure implementations of cryptographic algorithms. Under this work, such an implementation has been done for Advanced Encryption Standard (AES) on fast, efficient and low power Field Programmable Gate Arrays (FPGAs) whereby computational intensive cryptographic processes are offloaded from the main processor ...
Tópico(s): Coding theory and cryptography
2007 - | International journal of network security
Jen–Jee Chen, Yu–Chee Tseng, Hung-Wei Lee,
... for IEEE 802.11 wireless networks which support IEEE 802.11i security standard. Our approach consists of a dynamic ...
Tópico(s): Mobile Ad Hoc Networks
2007 - IEEE Communications Society | IEEE Communications Letters
... for a specific networking environment. The fact that IEEE 802.11i leaves the selection of the most suitable authentication ...
Tópico(s): Mobile Ad Hoc Networks
2007 - Inderscience Publishers | International Journal of Information and Computer Security
Abdul Samiah, Arshad Aziz, Nassar Ikram,
Recent advances in wireless networks and mobile computing technologies have resulted in extensive use. During the beginning of the commercialization of the wireless networks, organizations and individuals connected without concern for the security of their system or network. Over time, it became apparent that some form of security was required to prevent outsiders from exploiting the connected resources. AES-CCMP (Advances Encryption Standard – Counter Mode with Cipher Block Chaining Mode Protocol) ...
Tópico(s): Coding theory and cryptography
2007 - Institute of Electrical and Electronics Engineers | Proceedings - International Computer Software & Applications Conference
Xiao Liu, Abraham O. Fapojuwo,
In this paper, we analyze six major security properties of EAP (Extensible Authentication Protocol) methods and employ SVO (Syverson van Oorschot) logic based formal approach to evaluate those properties. We present a detailed analysis and comparative assessment of the three dominant EAP-based authentication protocols. The results of analysis are useful to WLAN designers in selecting a suitable authentication method for implementation.
Tópico(s): Bluetooth and Wireless Communication Technologies
2006 - Institute of Electrical and Electronics Engineers | IEEE Vehicular Technology Conference
Neil Smyth, M. McLoone, J.V. McCanny,
... encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable ...
Tópico(s): Advanced Authentication Protocols Security
2006 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems I Fundamental Theory and Applications
Emmanuel López-Trejo, Francisco Rodríguez‐Henríquez, Arturo Díaz-Pérez,
... CBC-MAC) mode has been included in the IEEE 802.11i wireless standard as a promising alternative to the ...
Tópico(s): Coding theory and cryptography
2006 - Springer Science+Business Media | Lecture notes in computer science
... 6. Wi-Fi Protected Access (WPA). 9.7. IEEE 802.11i. 9.8. Security in Cellular Networks. 9.9. ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2006 - Association of College and Research Libraries | Choice Reviews Online
Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces many researchers to revise robust and reliable Wireless Intrusion Detection Techniques (WIDTs). In this ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2010 - Science and Information Organization | International Journal of Advanced Computer Science and Applications