[go: up one dir, main page]

Purandare et al., 2005 - Google Patents

Enhancing Message Privacy in WEP

Purandare et al., 2005

View PDF
Document ID
7390539500930099766
Author
Purandare D
Guha R
Publication year

External Links

Snippet

The 802.11 standard defines the Wired Equivalent Privacy (WEP) and encapsulation of data frames. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol …
Continue reading at stars.library.ucf.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
EP1508220B1 (en) Secure mobile ad-hoc network and related methods
EP2996279B1 (en) Secure wireless local or metropolitan area network and related methods
Hager et al. An analysis of Bluetooth security vulnerabilities
Yang et al. An overview of cryptographic primitives for possible use in 5G and beyond
WO2007059558A1 (en) Wireless protocol for privacy and authentication
US7039190B1 (en) Wireless LAN WEP initialization vector partitioning scheme
Lackner A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX.
Shunman et al. WLAN and it's security problems
Barka et al. Impact of security on the performance of wireless-local area networks
Trimintzios et al. WiFi and WiMAX secure deployments
Yao et al. Enhancing RC4 algorithm for WLAN WEP protocol
Soliman et al. Application of synchronous dynamic encryption system in mobile wireless domains
Purandare et al. Enhancing Message Privacy in WEP
Caneill et al. Attacks against the WiFi protocols WEP and WPA
Barka et al. Impact of encryption on the throughput of infrastructure WLAN IEEE 802.11 g
Purandare Enhancing Message Privacy In Wired Equivalent Privacy.
Kumar et al. Analyzing the performance and security by using SHA3 in WEP
Junaid et al. Per packet authentication for ieee 802.11 wireless lan
Wan et al. An elliptic curve based handoff authentication protocol for WLAN
Buttyán et al. WiFi Security–WEP and 802.11 i
Pervaiz et al. Security in wireless local area networks
Ananda Mohan et al. WiFi Security-A Tutorial
Castelluccia-INRIA Securing 802.11 (WiFi) networks
Chitu SECURITY IMPROVEMENTS WITHIN IEEE 802.11I WIRELESS LOCAL AREA NETWORKS (WLANS)
Evanjaline et al. Design of Multithreaded Security Algorithm using Session Keys to Secure Initialization Vector (IV) for Enhancing the Wireless Protocol WEP