Enhanced WEP: An efficient solution to WEP threats

@article{Hassan2005EnhancedWA,
  title={Enhanced WEP: An efficient solution to WEP threats},
  author={H. R. Hassan and Yacine Challal},
  journal={Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005.},
  year={2005},
  pages={594-599}
}
Security is a strong requirement for effective deployment of business wireless communication applications. Therefore, many proposals dealt with security holes in wired equivalent privacy protocol (WEP). In this paper, we analyze WEP security holes and we propose an improvement over WEP which achieves, in addition to its security goals, another security service which is replay detection. Our premise is to permit deploying an efficient security mechanism on wireless networks, without… CONTINUE READING
Highly Cited
This paper has 19 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 15 extracted citations

Emerging Technologies in Computing

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering • 2018
View 7 Excerpts
Highly Influenced

Analyzing the behavior of WPA with modification

2015 International Conference on Communication Networks (ICCN) • 2015

Security of RFID Systems - A Hybrid Approach

2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing • 2011
View 1 Excerpt

Practical Defense against WEP and WPA-PSK Attack for WLAN

2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM) • 2010
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-7 of 7 references

An Inductive Chosen Plaintext Attack Against WEP/WEP2

W. Arbaugh
IEEE Document • 2001
View 1 Excerpt

Unsafe at Any Key Size: An Analysis of the WEP Encapsulation

J. Walker
IEEE 802.11 doc 00-362, • 2000
View 1 Excerpt

New directions in cryptography

IEEE Trans. Information Theory • 1976
View 1 Excerpt

Similar Papers

Loading similar papers…