Limit this search to....

Performance Evaluation Of Security Algorithms In A Wi-Fi Testbed
Contributor(s): Saxena, Kshitiz (Author), Sharma, Juhi (Author)
ISBN: 3659132535     ISBN-13: 9783659132537
Publisher: LAP Lambert Academic Publishing
OUR PRICE:   $50.27  
Product Type: Paperback
Published: May 2012
Qty:
Additional Information
BISAC Categories:
- Computers | Networking - General
Physical Information: 0.26" H x 6" W x 9" (0.37 lbs) 108 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
In the IEEE 802.11 standard an optional encryption protocol called Wired Equivalency Privacy (WEP) is used to make wireless traffic as secure as wired network traffic. However it has been found that WEP suffers several weaknesses like a shared key weakness, no per-packet authentication, vulnerability to disassociation attacks, no user identification and authentication, no central authentication, authorization, and accounting support and vulnerability of RC4 to known plaintext attacks. To address these concerns, The Temporal Key Integrity Protocol (TKIP) was created to fix the weaknesses of Wired Equivalent Privacy (WEP). Wireless security is an exciting field of study, and we aim to find more weaknesses and new application areas of the attacks on TKIP. We hope that our work may contribute to motivate people to migrate their wireless security protocols to the more secure alternative CCMP.