The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the key components of IEEE 802.11i authentication protocol to defend against various malicious attacks is its 4-way handshake scheme. However, since Message 1 in the handshake scheme has not been protected by the Message Integrity Code (MIC), the original 4-way handshake scheme specified by the IEEE standard is vulnerable to the Denial of Service (DoS) attacks and DoS flooding attacks. Several...
Because of enormous complexity of security protocols and lack of efficient security protocol modeling method, how to evaluate the WLAN security protocols poses unique and formidable challenges. To address this issue, a universal and extensible simulation platform for WLAN security protocols is proposed. First, the architecture of the platform is presented, which provides a unified interface to extend...
A research on the related technology and implementation of IP phone based on WiFi network is discussed in this paper; it includes the net structure of the technology used in designing the terminal of IP phone. This technology is a form of telecommunication that allows data and voice transmissions to be sent across a wide range of interconnected networks. A WiFi enabled IP phone is used which is preinstalled...
Available WLAN Mesh network access protocols and trusted network connect protocols can not satisfy the performance and security requirements of WLAN Mesh networks in trusted environment. A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed. Such protocol will achieve authentication and key confirmation among the access requestor, policy enforcement point and policy...
Security association established by authentication schemes enables wireless networks resilient from external attacks. However, an enhanced security guarantee will influence network performance more or less. In this paper, we observe the detailed actions of a security association in the procedure of establishment and shift, in a wireless mesh network (WMN), i.e. a typical multi-hop network. To investigate...
IEEE802.11 suffered from limited data confidentiality and cumbersome procedure for exchange of security parameters. In response to the security limitations in IEEE802.11, IEEE introduced 802.1x for authentication and key management. IEEE802.1x is a port based network access control protocol that uses extensible authentication protocol (EAP) at the transport layer.IEEE802.1x defines authentication...
Wireless mesh network (WMN) is one of emerging technology of the next generation networks, and it is going to address the internet provision to users at low cost anytime from anywhere. Being a broadband wireless network of the future, still it is facing a lot of technical and critical issues which are prohibiting it from the world wide deployment and acceptance. The multi-hop nature and the ad hoc...
IEEE 802.11i standard offers arguably uncompromised confidentiality and integrity services by utilizing advance encryption standard in counter with cipher block chaining message authentication code protocol (AES CCMP). However the Nonce construction mechanism employed in the standard is weak, leading to Initial Counter prediction. Resultantly, the effective Key Length used for encryption is reduced...
We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity Wi- Fi networks. It is the first scheme that combines the distributed wireless media surveillance and the centralized wired end socket level traffic "fingerprinting" The former is designed not only to detect various types of rogue APs, but also to discover suspicious activities so as...
Wireless network has grown rapidly in the past few years due to its advantages over the wired network, such as mobility, flexibility, convenience, and rapid deployment. But it also introduces new security issues due to its nature, i.e. it does not need any physical access. One of the solutions to overcome the limitation of wireless network security is the IEEE 802.1X specification, a mechanism for...
Of late, chaos based cryptography has attracted significant attraction of the researchers due to their simplicity of implementation, complex behavior and extreme sensitivity to initial conditions. In this paper an efficient technique to introduce security at physical (PHY) layer is proposed in 802.11i design to provide security in medium access control. Since it does not emphasize on availability,...
Pressurized rail tank cars transport large volumes of volatile liquids and gases throughout the country, much of which is hazardous and/or flammable. Our group is developing a trackside inspection system for these tank cars. It consists of five narrow frequency band pressure sensors with center frequencies of 40 and 75 kHz, a broad band microphone for sound normalization and three video cameras. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.