Proceedings of the 1st ACM Workshop on Wireless Security 2002
DOI: 10.1145/570681.570687
|View full text |Cite
|
Sign up to set email alerts
|

DoS and authentication in wireless public access networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(24 citation statements)
references
References 8 publications
0
24
0
Order By: Relevance
“…The Supplicant after receiving message1 generates other random value SNonce, MAC address of the supplicant that is SPA and derives a fresh temporal key Public Transient Key (PTK) which is a function of both SNonce and ANonce and stores both ANonce and SNonce in the memory. Than supplicant generates other message, Message2 which consist of SPA, SNonce, Sequence Number and MIC value which is a function of all other fields and is generated using calculated PTK as the key [7,13]. MIC is calculated in order to preserve the integrity of the send message as other fields are sent as plain text.…”
Section: -Way Handshakementioning
confidence: 99%
See 2 more Smart Citations
“…The Supplicant after receiving message1 generates other random value SNonce, MAC address of the supplicant that is SPA and derives a fresh temporal key Public Transient Key (PTK) which is a function of both SNonce and ANonce and stores both ANonce and SNonce in the memory. Than supplicant generates other message, Message2 which consist of SPA, SNonce, Sequence Number and MIC value which is a function of all other fields and is generated using calculated PTK as the key [7,13]. MIC is calculated in order to preserve the integrity of the send message as other fields are sent as plain text.…”
Section: -Way Handshakementioning
confidence: 99%
“…MIC is calculated in order to preserve the integrity of the send message as other fields are sent as plain text. On receiving Message2, AP generates PTK using the same method and verifies received MIC with the calculated one in order to guarantee its integrity [13]. Then again it constructs Message3 as shown in Figure2 which serves as an acknowledgement of message2 which is verified at supplicant side in order to confirm that correct PTK has been generated at other end, Message4 is again the acknowledgement by the supplicant.…”
Section: -Way Handshakementioning
confidence: 99%
See 1 more Smart Citation
“…The mechanism defined by IEEE 802.11i is vulnerable to memory exhaustion attacks [11], [13], [14] and DoS flooding.…”
Section: Dos and Memory Exhaustion Attacks On 4-way Handshakementioning
confidence: 99%
“…Those filters, constructed on the basis of a Kerberos authentication, are used by the access point to allow or deny the access of client stations to the network. This approach is vulnerable to IP Spoofing attacks, and to IP based DoS attacks 10 .…”
Section: Kerberos In Wireless Environmentsmentioning
confidence: 99%