Analysis of WPA in 802.11 Wireless Networks for Security
Abstract
Keywords
Full Text:
PDFReferences
D.Whiting, R.Housley, and N. Ferguson. “IEEE 802.11-02/001r2: AES Encryption and Authentication Using CTR Mode and CBC-MAC”, International Journal of Network Security, Vol no.3, 2008,pp.1-43.
M.Dworkin, “Recommendation for Block Cipher modes of Operation: the CCM Mode for Authentication and Confidentiality”, International Journal of Computer Science and Network Security, Vol no. 4, 2007,pp.1-27.
Abdul Samiah, Arshad Aziz and Nassar Ikram, “An Efficient Software Implementation of AES-CCM for IEEE 802.11i wireless standard”, IEEE Conference on Computer Software and Applications,2007,pp.689-694.
Levente Buttyan and Laszlo Dora, “WiFi security- WEP and 802.11i”, EURASIP Jthisnal on Wireless Communication and Networking, Vol no.1, 2006, p.1-13.
Guillaume Lehembre, “Wi-Fi security – WEP, WPA, WPA2”, ACM Transactions on Information and System Security, Vol no-2, Sep 2005, p.144-152.
Y.Mitsuyama, M.Kimura, T.Onoye and I.Shirakawa, “Architecture of IEEE 802.11i cipher algorithms for embedded systems”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol no-1, 2005,pp.757-760.
K.Vu and D.Zier, “FPGA Implementation of AES for CCM mode encryption using Xilinx Spartan-II”,Advanced Cryptography, Springer, 003, pp1-5.
M.Junaid, M.Mufti and M.Umar Ilyas, “Vulnerabilities of IEEE 802.11i Wireless LAN CCMP protocol”, Proceedings of IEEE INFOCOM, 2004,pp.436-443.
N.Sklavos, G.Selimis and O.Koufiopavlov, “FPGA Implementation cost & performance evaluation of IEEE 802.11 protocol encryption security schemes”, Proceedings of ACM MOBICOM, 2003, p.304-309.
M.Razvi Doomun and KMS Soyjjaudah, “Analytical Comparison of Cryptographic Techniques for Constrained Wireless Security”, International Journal of Network Security, 2009,Vol.9,No.1,pp 82-91.
W.A.Araugh, “An Inductive chosen plaintext attack against WEP/WEP2”, IEEE,2003,pp.1-18.
J.Edney, W.Arbaugh, “Real 802.11 Security: WiFi Protected Access and 802.11i”, Addison-Wesley, 2003.
J.Walker “Unsafe at any key size : An analysis of the WEP encapsulation”, IEEE Document 802.11-00/362, 2002,pp 1-45.
N.Shankar, J.Wan, K.Zhang, W.Araugh, “Ythis 802.11 network has no clothes”, Proceedings of the 7th ACM Conference on Mobile Computing and Networking, 2002.
R.Juneman, S.Matyas, C.Meyer, “AES Message Authentication”, Journal of Cryptology,2000,Vol.3,Issue 1,pp.45-58.
R.L.Rivest, “The RC4 Algorithm- RSA Data Security”, Internet Engineering Task Force, 2000.
D.Simon, Aboba and T.Moore, ”IEEE 802.11 Security and 802.1X”, IEEE Document 802.11-00/034r1, 2000.pp.1-28.
B.Nikita, G.Ian and W.David, “Security of WEP algorithm”, Proceedings of IEEE ITI 3rd International Conference on Information and Communication Technology (ICICT 2005), 1999.
N.Borisov, I.Goldberg, D.Wagner, “Intercepting mobile communications: the insecurity of 802.11”, ACM, 2001,pp 1-7..
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.