[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bakirdan et al., 2003 - Google Patents

Security algorithms in wireless LAN: proprietary or nonproprietary

Bakirdan et al., 2003

Document ID
17430394530447523812
Author
Bakirdan A
Qaddour J
Jalozie I
Publication year
Publication venue
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No. 03CH37489)

External Links

Snippet

Wireless LANs in business and for personal use are becoming common. However, many issues are impeding further adoption of the technology by end-users, in particular the inability or difficulty in providing adequate security between the networks and users. The two …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys

Similar Documents

Publication Publication Date Title
Miller Facing the challenge of wireless security
US8352739B2 (en) Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same
US7587598B2 (en) Interlayer fast authentication or re-authentication for network communication
Housley et al. Guidance for authentication, authorization, and accounting (AAA) key management
US20070189537A1 (en) WLAN session management techniques with secure rekeying and logoff
Dantu et al. EAP methods for wireless networks
US20090019539A1 (en) Method and system for wireless communications characterized by ieee 802.11w and related protocols
Radivilova et al. Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise
Cheikhrouhou et al. Security architecture in a multi-hop mesh network
Baek et al. A Survey of WPA and 802.11 i RSN Authentication Protocols
Ali et al. A comparative study of authentication methods for wi-fi networks
Xing et al. Security analysis and authentication improvement for ieee 802.11 i specification
Park et al. Two factor authenticated key exchange (TAKE) protocol in public wireless LANs
Bakirdan et al. Security algorithms in wireless LAN: proprietary or nonproprietary
Yang et al. Link-layer protection in 802.11 i WLANS with dummy authentication
Han A threat analysis of the extensible authentication protocol
Sorman et al. Implementing improved WLAN security
Liu et al. Extensible authentication protocols for IEEE standards 802.11 and 802.16
Sithirasenan et al. EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability
Kbar Wireless network token-based fast authentication
Pervaiz et al. Security in wireless local area networks
Kovačić et al. Improving the security of access to network resources using the 802.1 x standard in wired and wireless environments
Harding et al. Wireless authentication using remote passwords
Kumar ISSUES AND CONCERNS IN ENTITY AUTHENTICATION IN WIRELESS LOCAL AREA NETWORKS (WLANS).
Badra et al. Flexible and fast security solution for wireless LAN