Bakirdan et al., 2003 - Google Patents
Security algorithms in wireless LAN: proprietary or nonproprietaryBakirdan et al., 2003
- Document ID
- 17430394530447523812
- Author
- Bakirdan A
- Qaddour J
- Jalozie I
- Publication year
- Publication venue
- GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No. 03CH37489)
External Links
Snippet
Wireless LANs in business and for personal use are becoming common. However, many issues are impeding further adoption of the technology by end-users, in particular the inability or difficulty in providing adequate security between the networks and users. The two …
- 238000005516 engineering process 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Miller | Facing the challenge of wireless security | |
US8352739B2 (en) | Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same | |
US7587598B2 (en) | Interlayer fast authentication or re-authentication for network communication | |
Housley et al. | Guidance for authentication, authorization, and accounting (AAA) key management | |
US20070189537A1 (en) | WLAN session management techniques with secure rekeying and logoff | |
Dantu et al. | EAP methods for wireless networks | |
US20090019539A1 (en) | Method and system for wireless communications characterized by ieee 802.11w and related protocols | |
Radivilova et al. | Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise | |
Cheikhrouhou et al. | Security architecture in a multi-hop mesh network | |
Baek et al. | A Survey of WPA and 802.11 i RSN Authentication Protocols | |
Ali et al. | A comparative study of authentication methods for wi-fi networks | |
Xing et al. | Security analysis and authentication improvement for ieee 802.11 i specification | |
Park et al. | Two factor authenticated key exchange (TAKE) protocol in public wireless LANs | |
Bakirdan et al. | Security algorithms in wireless LAN: proprietary or nonproprietary | |
Yang et al. | Link-layer protection in 802.11 i WLANS with dummy authentication | |
Han | A threat analysis of the extensible authentication protocol | |
Sorman et al. | Implementing improved WLAN security | |
Liu et al. | Extensible authentication protocols for IEEE standards 802.11 and 802.16 | |
Sithirasenan et al. | EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability | |
Kbar | Wireless network token-based fast authentication | |
Pervaiz et al. | Security in wireless local area networks | |
Kovačić et al. | Improving the security of access to network resources using the 802.1 x standard in wired and wireless environments | |
Harding et al. | Wireless authentication using remote passwords | |
Kumar | ISSUES AND CONCERNS IN ENTITY AUTHENTICATION IN WIRELESS LOCAL AREA NETWORKS (WLANS). | |
Badra et al. | Flexible and fast security solution for wireless LAN |