A Survey of Wireless Security

@article{Prodanovic2007ASO,
  title={A Survey of Wireless Security},
  author={Radomir Prodanovic and Dejan Simic},
  journal={CIT},
  year={2007},
  volume={15},
  pages={237-255}
}
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. The paper also gives a summary of security improvements of WEP protocol that can lead to a higher level… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 20 references

MARANO, Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack inWi-Fi Protected Access and IEEE 802.11i

  • F. RANGO, S.D.C. LENTINI
  • EURASIP Journal on Wireless Communications and…
  • 2006
1 Excerpt

802.11i (How we got here and where are we headed)

  • E. PEREZ
  • 2004

802.11i: Robust and ready to go

  • L. PHIFER
  • http://searchmobilecomputing.techtarget
  • 2004
1 Excerpt

Similar Papers

Loading similar papers…