Proceedings of the 30th Annual ACM SIGUCCS Conference on User Services 2002
DOI: 10.1145/588646.588696
|View full text |Cite
|
Sign up to set email alerts
|

Securing a wireless network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…This obtained counter value allows the hacker to launch a TMTO attack [21]. TMTO attack stands for brute force / exhaustive key search attack [26]. TMTO is a compromise between increased storage requirements and reduced computing power.…”
Section: (Tmto) Precumputation Atackmentioning
confidence: 99%
“…This obtained counter value allows the hacker to launch a TMTO attack [21]. TMTO attack stands for brute force / exhaustive key search attack [26]. TMTO is a compromise between increased storage requirements and reduced computing power.…”
Section: (Tmto) Precumputation Atackmentioning
confidence: 99%
“…2nd Packet will goto DNS for resolution of the Certificate name. In this study authentication method is PKI used as Certificate based authentication which is most secured and encrypted [6] method of authentication of 802.1x. Purely layer 2 model of authentication has been used.…”
Section: B Testing Components Used For the Demonstrationmentioning
confidence: 99%
“…Most authentication protocols in WLAN are based on the 802.1x access control framework [168] and the EAP (Extensible Authentication Protocol) [169]. There are several typical protocols in the IETF standards, such as EAP-MD5, EAP-TLS, EAP-PEAP and EAP-AKA [170]. EAP-MD5 is the simplest, but its security is weak.…”
Section: Security Protocolsmentioning
confidence: 99%