Computer and Network Security 2020
DOI: 10.5772/intechopen.89857
|View full text |Cite
|
Sign up to set email alerts
|

Security in Wireless Local Area Networks (WLANs)

Abstract: Major research domains in the WLAN security include: access control & data frame protection, lightweight authentication and secure handoff. Access control standard like IEEE 802.11i provides flexibility in user authentication but on the other hand fell prey to Denial of Service (DoS) attacks. For Protecting the data communication between two communicating devices-three standard protocols i.e., WEP (Wired Equivalent Privacy), TKIP (Temporal Key Integrity Protocol) and AES-CCMP (Advanced Encryption Standard-Coun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Hence, at the time of handoff only 4-way handshake is required between STA and candidate AP. In this pre-authentication process, an inaccurate candidate AP prediction has associated resource wastage issues as full 802.1X will again be required [31]. Researchers have considered predictive authentication and proactive key distribution for reducing the handoff times.…”
Section: Secure Handoffmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, at the time of handoff only 4-way handshake is required between STA and candidate AP. In this pre-authentication process, an inaccurate candidate AP prediction has associated resource wastage issues as full 802.1X will again be required [31]. Researchers have considered predictive authentication and proactive key distribution for reducing the handoff times.…”
Section: Secure Handoffmentioning
confidence: 99%
“…Some of these approaches are as follows: (1) association rule mining [12][13][14], (2) fuzzy association rule mining [15], (3) artificial neural network [16][17][18], (4) support vector machines [19,20], (5) nearest neighbor [21], (6) hidden Markov model [22][23][24], (7) Kalman filter [25], (8) clustering [26], and (9) random forest [27,28]. Other machine learning methods have been proposed for learning the probability distribution of data and in applying statistical tests to detect outliers [29][30][31][32][33][34][35].…”
Section: Introductionmentioning
confidence: 99%