Purandare et al., 2005 - Google Patents
Enhancing Message Privacy in WEPPurandare et al., 2005
View PDF- Document ID
- 7390539500930099766
- Author
- Purandare D
- Guha R
- Publication year
External Links
Snippet
The 802.11 standard defines the Wired Equivalent Privacy (WEP) and encapsulation of data frames. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol …
- 230000002708 enhancing 0 title description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1508220B1 (en) | Secure mobile ad-hoc network and related methods | |
| EP2996279B1 (en) | Secure wireless local or metropolitan area network and related methods | |
| Hager et al. | An analysis of Bluetooth security vulnerabilities | |
| Yang et al. | An overview of cryptographic primitives for possible use in 5G and beyond | |
| WO2007059558A1 (en) | Wireless protocol for privacy and authentication | |
| US7039190B1 (en) | Wireless LAN WEP initialization vector partitioning scheme | |
| Lackner | A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX. | |
| Shunman et al. | WLAN and it's security problems | |
| Barka et al. | Impact of security on the performance of wireless-local area networks | |
| Trimintzios et al. | WiFi and WiMAX secure deployments | |
| Yao et al. | Enhancing RC4 algorithm for WLAN WEP protocol | |
| Soliman et al. | Application of synchronous dynamic encryption system in mobile wireless domains | |
| Purandare et al. | Enhancing Message Privacy in WEP | |
| Caneill et al. | Attacks against the WiFi protocols WEP and WPA | |
| Barka et al. | Impact of encryption on the throughput of infrastructure WLAN IEEE 802.11 g | |
| Purandare | Enhancing Message Privacy In Wired Equivalent Privacy. | |
| Kumar et al. | Analyzing the performance and security by using SHA3 in WEP | |
| Junaid et al. | Per packet authentication for ieee 802.11 wireless lan | |
| Wan et al. | An elliptic curve based handoff authentication protocol for WLAN | |
| Buttyán et al. | WiFi Security–WEP and 802.11 i | |
| Pervaiz et al. | Security in wireless local area networks | |
| Ananda Mohan et al. | WiFi Security-A Tutorial | |
| Castelluccia-INRIA | Securing 802.11 (WiFi) networks | |
| Chitu | SECURITY IMPROVEMENTS WITHIN IEEE 802.11I WIRELESS LOCAL AREA NETWORKS (WLANS) | |
| Evanjaline et al. | Design of Multithreaded Security Algorithm using Session Keys to Secure Initialization Vector (IV) for Enhancing the Wireless Protocol WEP |