[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Chen et al., 2013 - Google Patents

Security in wireless local area networks

Chen et al., 2013

View PDF
Document ID
4109677011060648020
Author
Chen L
Ji J
Zhang Z
Yang C
Gu G
Publication year
Publication venue
Wireless Network Security: Theories and Applications

External Links

Snippet

Abstract Wireless Local Area Networks (WLAN) allow end users to wirelessly access Internet with great convenience at home, work, or in public places. WLANs are currently being widely deployed in our real life with great success. However, it is still in its infant stage as long as …
Continue reading at www.cic.ipn.mx (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication

Similar Documents

Publication Publication Date Title
Karygiannis et al. Wireless Network Security:.
EP1834466B1 (en) Method and system for detecting attacks in wireless data communication networks
Hwang et al. A study on MITM (Man in the Middle) vulnerability in wireless network using 802.1 X and EAP
Alotaibi et al. Rogue access point detection: Taxonomy, challenges, and future directions
Chen et al. Wireless network security
Rana et al. Common security protocols for wireless networks: A comparative analysis
Chen et al. Security in wireless local area networks
Vinayakray-Jani Security within ad hoc networks
Sharma et al. A review on wireless network security
Yang et al. Link-layer protection in 802.11 i WLANS with dummy authentication
Teyou et al. Solving downgrade and dos attack due to the four ways handshake vulnerabilities (WIFI)
Scarfone et al. Guide to securing legacy IEEE 802.11 wireless networks
Jain et al. Penetration Testing of Wireless EncryptionProtocols
Feil 802.11 wireless network policy recommendation for usage within unclassified government networks
Mosawi et al. Exploring Wi-Fi security challenges and proposing solutions: The case of Afghanistan
Scarfone et al. Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT)
Pervaiz et al. Security in wireless local area networks
Peter et al. A secure dynamic cryptographic and encryption protocol for wireless networks
Farik et al. Recurrent Security Gaps In 802.11 ac Routers
Liu et al. Analysis of wireless mesh network security based on node function
Ayat et al. Wireless Security
Petiz et al. Detection of WPS attacks based on multiscale traffic analysis
Gill Intrusion detection techniques in wireless local area networks
Scarfone et al. Sp 800-48 rev. 1. guide to securing legacy ieee 802.11 wireless networks
Borgi Access control and availability aspects using wireless solutions based on IEEE 802.11 technologies, providing access to classified networks