Proceedings ArticleDOI
A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)
Arash Habibi Lashkari,Mir Mohammad Seyed Danesh,Behrang Samadi +2 more
- pp 48-52
Reads0
Chats0
TLDR
This paper tries to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness, and makes a comparison among WEP and WPA and WEP2 as all wireless security protocols in Wi-Fi technology.Abstract:
Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in ICFCC 2009 Malaysia and ICCDA 2009 Singapore [1] [2], we explained the structure of WEP and WPA as first and second wireless security protocols and discussed all their versions, problems and improvements. Now, we try to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness. Finally we make a comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology. In the next phase we hope that we will publish a complete comparison among wireless security techniques by add the WiMax security technique and make a whole comparison among all security protocols in this area.read more
Citations
More filters
Journal ArticleDOI
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Journal ArticleDOI
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
Journal ArticleDOI
Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks
TL;DR: It is shown that the impact of ghost is very large and that it can facilitate a variety of threats including denial of service and replay attacks, and several recommendations on how to localize and withstand the ghost and other related attacks in ZigBee networks are proposed.
Journal ArticleDOI
Design of an OFDM Physical Layer Encryption Scheme
TL;DR: A new encryption scheme implemented at the physical layer of wireless networks employing orthogonal frequency-division multiplexing (OFDM) is presented, shown to perform better in terms of search space, key rate, and complexity in comparison with other OFDM physical layer encryption schemes.
Journal ArticleDOI
Mobile microscopy as a screening tool for oral cancer in India: A pilot study.
Arunan Skandarajah,Sumsum P. Sunny,Praveen Gurpur,Clay D. Reber,Michael V. D’Ambrosio,Nisheena Raghavan,Bonney Lee James,Ravindra D. Ramanjinappa,Amritha Suresh,Uma Kandasarma,Praveen Birur,Vinay Kumar,Honorius-Cezar Galmeanu,Alexandru Itu,Mihai Modiga-Arsu,Saskia Rausch,Maria Sramek,Manohar Kollegal,Gianluca Paladini,Moni Abraham Kuriakose,Lance Ladic,Felix P. Koch,Daniel A. Fletcher +22 more
TL;DR: Results indicated that the instrument successfully collected images of sufficient quality to enable remote diagnoses that show concordance with existing techniques, and further studies will evaluate the effectiveness of oral cancer screening with mobile microscopy by minimally trained technicians in low-resource settings.
References
More filters
Journal ArticleDOI
Security in wireless sensor networks
TL;DR: This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.
Journal ArticleDOI
Weaknesses in the temporal key hash of WPA
V. Moen,Håvard Raddum,Kjell Hole +2 more
TL;DR: Given a few RC4 packet keys in WPA it is possible to find the Temporal Key (TK) and the Message Integrity Check (MIC) key and this shows that parts of WPA are weak on their own.
Book
Security for wireless sensor networks
Donggang Liu,Peng Ning +1 more
TL;DR: Broadcast Authentication, Pairwise Key Establishment, Secure Localization, and Improving Pairwisekey Establishment Using Deployment Knowledge are reviewed.
Proceedings ArticleDOI
Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)
TL;DR: This paper explains the structure of WEP as a first wireless security standard, tries to explain all of WPA versions and problems with the best solutions, and makes a comparison between WEP and WPA.