2008 Third International Conference on Communications and Networking in China 2008
DOI: 10.1109/chinacom.2008.4684959
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight solution for Wireless LAN: Letter-envelop protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Thus, the AP will not be able to update its database and used the old MAC address. Nguyen et al [8], used letter-envelop protocol (LEP) to authenticate management frames. The unprotected management frames carried the MAC address of source, so an attacker can easily perform de-authentication and disassociation attacks by spoofing MAC address.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the AP will not be able to update its database and used the old MAC address. Nguyen et al [8], used letter-envelop protocol (LEP) to authenticate management frames. The unprotected management frames carried the MAC address of source, so an attacker can easily perform de-authentication and disassociation attacks by spoofing MAC address.…”
Section: Related Workmentioning
confidence: 99%
“…A lightweight authentication solution for dissociation DoS attacks, based upon Letter‐Envelop Protocol, is proposed by Nguyen . The STA during association phase generates two strong random numbers (say p, q) and then computes N = p * q.…”
Section: Protection Against Dos Attacksmentioning
confidence: 99%
“…There are few solutions (Category V, Table ) that are proposed, keeping in view the DoS threat caused using deauthentication/disassociation frames. The secure wireless scheme is similar to other spoof‐reducing schemes of Category I. Letter‐Envelop Protocol is a small but effective scheme to protect against deauthentication/disassociation DoS attacks. Here, the computation time is required to calculate the prime numbers, and the frame is modified to accommodate the prime numbers.…”
Section: Comparison Of Dos Solutions In Ieee 80211imentioning
confidence: 99%