2012
DOI: 10.1109/msp.2012.60
|View full text |Cite
|
Sign up to set email alerts
|

The Insecurity of Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(25 citation statements)
references
References 3 publications
0
25
0
Order By: Relevance
“…In [5] the insecurity of wireless networks is discussed. [6] is about the privacy and security issues of multimedia services.…”
Section: Related Workmentioning
confidence: 99%
“…In [5] the insecurity of wireless networks is discussed. [6] is about the privacy and security issues of multimedia services.…”
Section: Related Workmentioning
confidence: 99%
“…RELATED WORK Sheldon, Weber, Yoo and Pan [1] described how the wireless LAN encryption standards such as WEP, WPA/WPA2 are vulnerable to attack. They presented some of the attacks on encryption standards such as Chop-chop attack, Brute force, Beck-Tews, Halvorsen-Haugen and the hole 196 attacks etc.…”
Section: Overview Of Wlanmentioning
confidence: 99%
“…WPA uses the same encryption algorithm (RC4) used in WEP but improved by the use of a 48 bit temporary key integrity protocol (TKIP) sequence counter (TSC) instead of WEP's 24 bit key. Moreover, the 64 bit message integrity check (MIC) algorithm named Michael is used to ensure integrity [1]. Furthermore, to improve user authentication and access control, WPA uses the extensible authentication protocol (EAP) and the IEEE 802.1x standard port based access control.…”
Section: Wlan Vulnerabilitiesmentioning
confidence: 99%
See 2 more Smart Citations