2014
DOI: 10.1002/sec.1079
|View full text |Cite
|
Sign up to set email alerts
|

On the IEEE 802.11i security: a denial‐of‐service perspective

Abstract: The IEEE 802.11i standard provides authentication and security at the Medium Access Control layer in wireless local area networks (WLANs). It involves an authentication process followed by a four‐way handshake to evolve a key for securing data sessions. The standard suffers under denial‐of‐service (DoS) attacks. These attacks often block the ongoing communication process and deprive services to the legitimate users. These are easy to conduct while maintaining anonymity of the attackers. It hence becomes impera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 66 publications
0
9
0
Order By: Relevance
“…Traditionally, the entity authentication and access control is provided by the legacy authentication standard i.e., WEP. It has proved insufficient [2] and is hence, deprecated. Currently, IEEE 802.11i (WPA2) [1] security standard is used as an entity authentication and access control mechanism.…”
Section: Access Controlmentioning
confidence: 99%
See 3 more Smart Citations
“…Traditionally, the entity authentication and access control is provided by the legacy authentication standard i.e., WEP. It has proved insufficient [2] and is hence, deprecated. Currently, IEEE 802.11i (WPA2) [1] security standard is used as an entity authentication and access control mechanism.…”
Section: Access Controlmentioning
confidence: 99%
“…Once STAs are authenticated, the standard evolves fresh secret keys to secure data communication over 802.11 wireless LANs. A large numbers of packets are used in these processes [2], which results in an increased process length, communication overhead and network overhead. The authentication and 4-way handshake both are prone to Denial of Service (DoS) attacks.…”
Section: Access Controlmentioning
confidence: 99%
See 2 more Smart Citations
“…The victim may be a single host or entire network. The DDoS attack also exhausts the computing and communication resources of the victim within a short period of time …”
Section: Introductionmentioning
confidence: 99%