Chen et al., 2013 - Google Patents
Security in wireless local area networksChen et al., 2013
View PDF- Document ID
- 4109677011060648020
- Author
- Chen L
- Ji J
- Zhang Z
- Yang C
- Gu G
- Publication year
- Publication venue
- Wireless Network Security: Theories and Applications
External Links
Snippet
Abstract Wireless Local Area Networks (WLAN) allow end users to wirelessly access Internet with great convenience at home, work, or in public places. WLANs are currently being widely deployed in our real life with great success. However, it is still in its infant stage as long as …
- 230000002708 enhancing 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Karygiannis et al. | Wireless Network Security:. | |
EP1834466B1 (en) | Method and system for detecting attacks in wireless data communication networks | |
Hwang et al. | A study on MITM (Man in the Middle) vulnerability in wireless network using 802.1 X and EAP | |
Alotaibi et al. | Rogue access point detection: Taxonomy, challenges, and future directions | |
Chen et al. | Wireless network security | |
Rana et al. | Common security protocols for wireless networks: A comparative analysis | |
Chen et al. | Security in wireless local area networks | |
Vinayakray-Jani | Security within ad hoc networks | |
Sharma et al. | A review on wireless network security | |
Yang et al. | Link-layer protection in 802.11 i WLANS with dummy authentication | |
Teyou et al. | Solving downgrade and dos attack due to the four ways handshake vulnerabilities (WIFI) | |
Scarfone et al. | Guide to securing legacy IEEE 802.11 wireless networks | |
Jain et al. | Penetration Testing of Wireless EncryptionProtocols | |
Feil | 802.11 wireless network policy recommendation for usage within unclassified government networks | |
Mosawi et al. | Exploring Wi-Fi security challenges and proposing solutions: The case of Afghanistan | |
Scarfone et al. | Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT) | |
Pervaiz et al. | Security in wireless local area networks | |
Peter et al. | A secure dynamic cryptographic and encryption protocol for wireless networks | |
Farik et al. | Recurrent Security Gaps In 802.11 ac Routers | |
Liu et al. | Analysis of wireless mesh network security based on node function | |
Ayat et al. | Wireless Security | |
Petiz et al. | Detection of WPS attacks based on multiscale traffic analysis | |
Gill | Intrusion detection techniques in wireless local area networks | |
Scarfone et al. | Sp 800-48 rev. 1. guide to securing legacy ieee 802.11 wireless networks | |
Borgi | Access control and availability aspects using wireless solutions based on IEEE 802.11 technologies, providing access to classified networks |