Nick L. Petroni, William A. Arbaugh,
... area networks. A synchronous active attack against the wired equivalent privacy protocol demonstrates how mitigating one flaw or attack ...
Tópico(s): RFID technology advancements
2003 - Institute of Electrical and Electronics Engineers | IEEE Security & Privacy
Ryoichiro Obukata, Miralda Cuka, Donald Elmazi, Tetsuya Oda, Makoto Ikeda, Leonard Barolli,
... analyse the optimised link state routing (OLSR) and wired equivalent privacy (WEP) protocol in an indoor scenario, and mean ...
Tópico(s): IoT and Edge/Fog Computing
2017 - | International Journal of Space-Based and Situated Computing
Tetsuya Oda, Keita Matsuo, Leonard Barolli, Masafumi Yamada, Yi Liu,
... performance of Optimised Link State Routing (OLSR) and Wired Equivalent Privacy (WEP) protocol in an indoor scenario. For evaluation ...
Tópico(s): IoT and Edge/Fog Computing
2017 - | International Journal of Web and Grid Services
S. A. Alhumrani, Jayaprakash Kar,
... Secure Shell Protocol, Internet Protocol Security (IPSec), Kerberos, Wired Equivalent Privacy (WEP) and WiFi Protected Access(WPA) and discuss ...
Tópico(s): Advanced Authentication Protocols Security
2016 - Science and Engineering Research Support Society | International Journal of Security and Its Applications
Asim F. Choudhri, Arindam Chatterjee, Ramin Javan, Martin G. Radvany, George Shih,
... cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components ...
Tópico(s): Cardiovascular and Diving-Related Complications
2015 - Radiological Society of North America | Radiographics
Tyler Johnson, Daniel Roggow, Phillip H. Jones, Joseph Zambreno,
... has provided serious improvements over the now deprecated wired equivalent privacy (WEP) protocol. WPA, however, still has some flaws ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2015 - World Scientific | Journal of Circuits Systems and Computers
... wireless systems and conventions at present accessible like Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi- ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2014 - | International Journal of Future Generation Communication and Networking
Lazar Stоšić, Milena Bogdanović,
... operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802. ...
Tópico(s): Chaos-based Image/Signal Encryption
2012 - Science and Information Organization | International Journal of Advanced Computer Science and Applications
... Standards Association formulated some security protocols, for example, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access Temporal Key ...
Tópico(s): Wireless Networks and Protocols
2011 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Information and Systems
Li Wang, Bala Srinivasan, Nandita Bhattacharjee,
... the replacement of the old security standard named Wired Equivalent Privacy (WEP), and it aims to eliminate all known ...
Tópico(s): Cryptography and Data Security
2011 - Academy Publisher | Journal of Networks
Teramura Ryoichi, Yasuo Asakura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii,
Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should ...
Tópico(s): Network Security and Intrusion Detection
2010 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Ying-Sung Lee, Hsien-Te Chien, Wen-Nung Tsai,
IEEE 802.11 networks are insecure. Wired Equivalent Privacy (WEP), the security mechanism used in 802.11, was proved to be vulnerable. IEEE 802.11i, the security enhancement, concentrates only on ...
Tópico(s): Mobile Ad Hoc Networks
2009 - Institute of Information Science | Journal of information science and engineering
Radomir Prodanović, Dejan Simić,
... for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its ...
Tópico(s): Mobile Ad Hoc Networks
2007 - Faculty of Electrical Engineering and Computing, University of Zagreb | Journal of Computing and Information Technology
Mohammed Boulmalf, Ezedin Barka, Abderrahmane Lakas,
... encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on ...
Tópico(s): Advanced Wireless Network Optimization
2007 - Elsevier BV | Computer Communications
Ezedin Barka, Mohammed Boulmalf,
... encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2007 - International Communication Association | Journal of Communications
Chetan Nanjunda Mathur, K. P. Subbalakshmi,
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although ...
Tópico(s): Advanced Authentication Protocols Security
2007 - | International journal of network security
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan, Edilbert Kamal Dass,
Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE ...
Tópico(s): Mobile Ad Hoc Networks
2006 - Inderscience Publishers | International Journal of Wireless and Mobile Computing
Neil Smyth, M. McLoone, J.V. McCanny,
... instructions and hardware coprocessors, is capable of performing wired equivalent privacy, temporal key integrity protocol, counter mode with cipher ...
Tópico(s): Advanced Authentication Protocols Security
2006 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems I Fundamental Theory and Applications
Abstract On the surface, wireless networks act the same as their wired counterparts, transporting data between network devices. However, there is one fundamental, and quite significant, difference: WLANs are based on radio communications technology, as an alternative to structured wiring and cables. Data is transmitted between devices through the air via the radio waves. Devices that participate in a WLAN must have a network interface card (NIC) with wireless capabilities. This essentially means ...
Tópico(s): Bluetooth and Wireless Communication Technologies
2006 - Taylor & Francis | Information Systems Security
Emmanuel López-Trejo, Francisco Rodríguez‐Henríquez, Arturo Díaz-Pérez,
... techniques have been proposed for replacing the broken Wired Equivalent Privacy (WEP) protocol, which arguably is the most widely ...
Tópico(s): Coding theory and cryptography
2006 - Springer Science+Business Media | Lecture notes in computer science
Adam Stubblefield, John P. A. Ioannidis, Aviel D. Rubin,
In this paper, we present a practical key recovery attack on WEP, the link-layer security protocol for 802.11b wireless networks. The attack is based on a partial key exposure vulnerability in the RC4 stream cipher discovered by Fluhrer, Mantin, and Shamir. This paper describes how to apply this flaw to breaking WEP, our implementation of the attack, and optimizations that can be used to reduce the number of packets required for the attack. We conclude that the 802.11b WEP standard is completely ...
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2004 - Association for Computing Machinery | ACM Transactions on Information and System Security
... level of security must be guaranteed. The WEP (Wired Equivalent Privacy) protocol, originally proposed as the security mechanism of ...
Tópico(s): Advanced Malware Detection Techniques
2004 - Consortium for Computing Sciences in Colleges | Journal of computing sciences in colleges
... incorporate a cryptographic message integrity code into its wired equivalent privacy (WEP) protocol, and relied upon CRC-32 for ...
Tópico(s): Wireless Networks and Protocols
2004 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Wireless Communications
Scott Fluhrer, Itsik Mantin, Adi Shamir,
... operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802. ...
Tópico(s): Cryptography and Data Security
2001 - Springer Science+Business Media | Lecture notes in computer science
The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2008 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Communications
The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over the air communication. While almost all ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2006 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Vipin Poddar, Hitesh Choudhary,
... about the disadvantages of wireless security protocols.WEP (Wired Equivalent privacy), WPA (Wi-Fi Protected Access) and RSN (Robust ...
Tópico(s): Network Packet Processing and Optimization
2014 - | International Journal on AdHoc Networking Systems
Shubh Gupta, Oroos Arshi, Ambika Aggarwal,
... when data is in transit. Also WEP/WPA (wired equivalent privacy/ wireless protected access) cracking tools are taken care ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2023 - IGI Global | Advances in information security, privacy, and ethics book series
Remigius Chidiebere Diovu, John T. Agee,
... congestion scenario. Stochastic TCP congestion management schemes with wired equivalent privacy (WEP) and the Data Minimizing Function (DMF) scheme ...
Tópico(s): Security in Wireless Sensor Networks
2018 - | International journal of engineering research in Africa
Amar Kumar Mohapatra, Nupur Prakash,
... Therefore, many proposals dealt with security holes in Wired Equivalent Privacy protocol (WEP). In this paper, we analyze WEP ...
Tópico(s): Cryptographic Implementations and Security
2010 - Taylor & Francis | Journal of Discrete Mathematical Sciences and Cryptography