2019 IEEE 39th Central America and Panama Convention (CONCAPAN XXXIX) 2019
DOI: 10.1109/concapanxxxix47272.2019.8977073
|View full text |Cite
|
Sign up to set email alerts
|

Hardening as a best practice for WLAN Security Meanwhile WPA3 is released

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…However, due to vulnerabilities in its design including short IV length and FMS attack, WEP key was broken after sniffing and analysing wireless packets. It was even reported that using tools such as Aircrack-ng, the 104-bit WEP key could be broken within seconds [5]. As such, due to underlying design limitations, WEP was replaced by Wi-Fi Protected Access (WPA) in 2003, which implemented the Temporal Key Integrity Protocol (TKIP) along with RC4.…”
Section: Background On the Evolution Of Wlan Securitymentioning
confidence: 99%
See 3 more Smart Citations
“…However, due to vulnerabilities in its design including short IV length and FMS attack, WEP key was broken after sniffing and analysing wireless packets. It was even reported that using tools such as Aircrack-ng, the 104-bit WEP key could be broken within seconds [5]. As such, due to underlying design limitations, WEP was replaced by Wi-Fi Protected Access (WPA) in 2003, which implemented the Temporal Key Integrity Protocol (TKIP) along with RC4.…”
Section: Background On the Evolution Of Wlan Securitymentioning
confidence: 99%
“…The study concluded that VAPT is an effective strategy for cyber defence technology and highlighted the need to increase the use of VAPT for complete system security. Another paper investigated cyber security vulnerabilities and mitigations while focusing on industrial radio technologies, including IEEE 802.15.4, IEEE 802.11.1, WirelessHART, Bluetooth, and ZigBee [5]. The study examined how industrial radio technology vulnerabilities may be utilized as vectors for cyberattacks on control systems in complex infrastructures.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations