Limpar
110 resultados

Acesso aberto

Tipo do recurso

Tipo de base de dados

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Revisado por pares

Jyh‐Cheng Chen, Ming-Chia Jiang, Yiwen Liu,

... key management in 802.11i is discussed. Because 802.11i incorporates IEEE 802.1X as its authentication enhancement, 802.1X ...

Tópico(s): Wireless Communication Networks Research

2005 - Institute of Electrical and Electronics Engineers | IEEE Wireless Communications

Artigo Revisado por pares

Yuteng Lu, Meng Sun,

IEEE 802.11i is the IEEE standard that provides enhanced MAC security and has been widely used in wireless networks and Internet of ... and verification approach based on timed automata for IEEE 802.11i protocol, using the UPPAAL model checker, to check correctness of the changes in IEEE 802.11i protocol and provide better security.

Tópico(s): Security and Verification in Computing

2018 - World Scientific | International Journal of Software Engineering and Knowledge Engineering

Artigo

B.J. Potter,

... that address growing wireless network security problems. The 802.11i IEEE draft standard provides next-generation authentication, authorization, and encryption capabilities. The WiFi Alliance, a wireless industry organization, has jumped the gun and created the WiFi Protected Access (WPA) standard, a subset of the 802.11i draft. These new standards are more complicated than ...

Tópico(s): Wireless Networks and Protocols

2003 - Institute of Electrical and Electronics Engineers | IEEE Security & Privacy

Artigo Revisado por pares

Li Wang, Bala Srinivasan, Nandita Bhattacharjee,

IEEE 802.11i standard defines the security specifications of IEEE 802.11 series Wireless Local Area Network (WLAN). It ... the availability aspect. Many researchers have shown that IEEE 802.11i standard cannot prevent various Denial of Service (DoS) ... authentication, disassociation and memory/CPU DoS attacks. Besides, IEEE 802.11i reserved the PSK mode of WEP for flexibility and backward compatibility. However, the PSK mode in IEEE 802.11i standard fails to provide sufficient security to prevent ... we present our solutions which can effectively improve IEEE 802.11i. For memory/CPU DoS attack against 4-way ...

Tópico(s): Cryptography and Data Security

2011 - Academy Publisher | Journal of Networks

Artigo Acesso aberto Revisado por pares

Rajeev Singh, Teek Parval Sharma,

Abstract The IEEE 802.11i standard provides authentication and security at the Medium Access Control layer in wireless local area networks (WLANs). It ... learn about the attacks and their solutions in IEEE 802.11i‐protected WLANs so that future research proposals and ... DoS attacks and existing solutions pertaining to the IEEE 802.11i security standard. Copyright © 2014 John Wiley & Sons, Ltd.

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2014 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto Revisado por pares

Floriano De Rango, Dionigi Cristian Lentini, S. Marano,

This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS ... time in comparison with the standard WPA and IEEE 802.11i protocols. However, if the mobile device presents different ...

Tópico(s): Wireless Networks and Protocols

2006 - Springer Nature | EURASIP Journal on Wireless Communications and Networking

Capítulo de livro Revisado por pares

Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Oh-Young Song,

Tópico(s): Telecommunications and Broadcasting Technologies

2005 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Avishai Wool,

... a stream cipher (RC4) for encryption. The latest IEEE 802.11i draft addresses this, and other, weaknesses discovered in WEP. IEEE 802.11i suggests three new modes of operation: two based ...

Tópico(s): Wireless Networks and Protocols

2004 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Wireless Communications

Capítulo de livro Acesso aberto Revisado por pares

Jianyong Huang, Jennifer Seberry, Willy Susilo, M. W. Bunder,

The latest IEEE 802.11i uses a keyed hash function, called Michael, as the message integrity code. This paper describes some properties and ...

Tópico(s): Cryptographic Implementations and Security

2005 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Ignacio Algredo‐Badillo, Claudia Feregrino-Uribe, René Cumplido, Miguel Morales‐Sandoval,

... the basis for the security architecture of the IEEE 802.11i standard. AES-CCMP is based on the AES- ...

Tópico(s): Opportunistic and Delay-Tolerant Networks

2010 - Elsevier BV | Computers & Electrical Engineering

Capítulo de livro Acesso aberto Revisado por pares

Ralf Küsters, Max Tuengerthal,

... protocols, such as SSL/TLS, SSH, IPsec, DNSSEC, IEEE 802.11i, and Kerberos, derive new keys from other keys. ... method to analyze two central protocols of the IEEE 802.11i standard, namely the 4-Way Handshake Protocol and ...

Tópico(s): Cryptographic Implementations and Security

2011 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Revisado por pares

Duhyun Bae, Jiho Kim, Sehyun Park, Oh-Young Song,

... In this paper, we propose a design of IEEE 802.11i hardware architecture to support these new MAC mechanisms. ...

Tópico(s): Cooperative Communication and Network Coding

2005 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Mohamad Sbeiti, Niklas Goddemeier, Daniel Behnke, Christian Wietfeld,

... the UAVs. Contemporary security standards, such as the IEEE 802.11i and the security mechanisms of the IEEE 802.11s mesh standard, are vulnerable to routing ...

Tópico(s): Opportunistic and Delay-Tolerant Networks

2015 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Wireless Communications

Artigo Acesso aberto Revisado por pares

Kuang-Hui Chi, Yung‐Chien Shih, Ho‐Han Liu, Jui-Tang Wang, Shiao‐Li Tsao, Chien‐Chao Tseng,

... or achieves comparable performance resulting from the counterpart IEEE 802.11i scheme with high likelihood of 70%-85% successful ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2010 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Vehicular Technology

Artigo Acesso aberto

Elankayer Sithirasenan, Vallipuram Muthukkumarasamy,

... reliable security mechanism. The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for authentication, authorization and key ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2007 - Institute of Electrical and Electronics Engineers | ˜The œ... IEEE International Conference on Networks/˜The œIEEE International Conference on Networks

Artigo Acesso aberto

Yuteng Lu, Meng Sun,

IEEE 802.11i is the IEEE standard that provides enhanced MAC security and has been widely used in wireless networks and Internet of ... and verification approach based on timed automata for IEEE 802.11i protocol, using the UPPAAL model checker, to check correctness of the changes in IEEE 802.11i protocol and provide better security.

Tópico(s): Access Control and Trust

2018 - | Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering

Artigo Revisado por pares

Brittlea Brown,

To improve authentication robustness, IEEE 802.11i adds the need for an authentication server to the standard. It also implements a two-way authentication method to prevent the man-in-the-middle attacks that have been so prevalent on IEEE 802.11b networks.

Tópico(s): Wireless Networks and Protocols

2003 - Institute of Electrical and Electronics Engineers | IEEE Potentials

Artigo Acesso aberto

Anupam Datta, Ante Đerek, John C. Mitchell, Arnab Roy,

... a number of industry standards including SSL/TLS, IEEE 802.11i and Kerberos V5.

Tópico(s): Cryptographic Implementations and Security

2007 - Elsevier BV | Electronic Notes in Theoretical Computer Science

Artigo

Arshad Aziz, Nassar Ikram,

The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realization of fast and secure implementations of cryptographic algorithms. Under this work, such an implementation has been done for Advanced Encryption Standard (AES) on fast, efficient and low power Field Programmable Gate Arrays (FPGAs) whereby computational intensive cryptographic processes are offloaded from the main processor ...

Tópico(s): Coding theory and cryptography

2007 - | International journal of network security

Artigo Revisado por pares

Jen–Jee Chen, Yu–Chee Tseng, Hung-Wei Lee,

... for IEEE 802.11 wireless networks which support IEEE 802.11i security standard. Our approach consists of a dynamic ...

Tópico(s): Mobile Ad Hoc Networks

2007 - IEEE Communications Society | IEEE Communications Letters

Artigo Revisado por pares

Khidir M. Ali, Thomas Owens,

... for a specific networking environment. The fact that IEEE 802.11i leaves the selection of the most suitable authentication ...

Tópico(s): Mobile Ad Hoc Networks

2007 - Inderscience Publishers | International Journal of Information and Computer Security

Artigo

Abdul Samiah, Arshad Aziz, Nassar Ikram,

Recent advances in wireless networks and mobile computing technologies have resulted in extensive use. During the beginning of the commercialization of the wireless networks, organizations and individuals connected without concern for the security of their system or network. Over time, it became apparent that some form of security was required to prevent outsiders from exploiting the connected resources. AES-CCMP (Advances Encryption Standard – Counter Mode with Cipher Block Chaining Mode Protocol) ...

Tópico(s): Coding theory and cryptography

2007 - Institute of Electrical and Electronics Engineers | Proceedings - International Computer Software & Applications Conference

Artigo

Xiao Liu, Abraham O. Fapojuwo,

In this paper, we analyze six major security properties of EAP (Extensible Authentication Protocol) methods and employ SVO (Syverson van Oorschot) logic based formal approach to evaluate those properties. We present a detailed analysis and comparative assessment of the three dominant EAP-based authentication protocols. The results of analysis are useful to WLAN designers in selecting a suitable authentication method for implementation.

Tópico(s): Bluetooth and Wireless Communication Technologies

2006 - Institute of Electrical and Electronics Engineers | IEEE Vehicular Technology Conference

Artigo

Neil Smyth, M. McLoone, J.V. McCanny,

... encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable ...

Tópico(s): Advanced Authentication Protocols Security

2006 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems I Fundamental Theory and Applications

Capítulo de livro Revisado por pares

Emmanuel López-Trejo, Francisco Rodríguez‐Henríquez, Arturo Díaz-Pérez,

... CBC-MAC) mode has been included in the IEEE 802.11i wireless standard as a promising alternative to the ...

Tópico(s): Coding theory and cryptography

2006 - Springer Science+Business Media | Lecture notes in computer science

Artigo

Aftab Ahmad,

... 6. Wi-Fi Protected Access (WPA). 9.7. IEEE 802.11i. 9.8. Security in Cellular Networks. 9.9. ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2006 - Association of College and Research Libraries | Choice Reviews Online

Artigo Acesso aberto

Aiman Abu, Ramzi Abed,

Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces many researchers to revise robust and reliable Wireless Intrusion Detection Techniques (WIDTs). In this ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2010 - Science and Information Organization | International Journal of Advanced Computer Science and Applications