2003
DOI: 10.1145/769800.769823
|View full text |Cite
|
Sign up to set email alerts
|

Security flaws in 802.11 data link protocols

Abstract: Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
46
0
6

Year Published

2004
2004
2015
2015

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 121 publications
(52 citation statements)
references
References 5 publications
0
46
0
6
Order By: Relevance
“…Accordingly, there have been numerous attempts to make various wireless platforms secure by migrating traditional network security strategies to the wireless domain. In spite of these efforts, the development of secure wireless protocols has proven to be a very elusive goal-a fact that is supported by numerous papers revealing successful attacks on many wireless security protocols [1][2][3][4][5]. Perhaps one of the most fundamental reasons why wireless systems have been difficult to secure stems from the broadcast nature of the medium itself, which facilitates both eavesdropping and easy network intrusion.…”
Section: Introductionmentioning
confidence: 99%
“…Accordingly, there have been numerous attempts to make various wireless platforms secure by migrating traditional network security strategies to the wireless domain. In spite of these efforts, the development of secure wireless protocols has proven to be a very elusive goal-a fact that is supported by numerous papers revealing successful attacks on many wireless security protocols [1][2][3][4][5]. Perhaps one of the most fundamental reasons why wireless systems have been difficult to secure stems from the broadcast nature of the medium itself, which facilitates both eavesdropping and easy network intrusion.…”
Section: Introductionmentioning
confidence: 99%
“…39(Supl. ):55-60, 2015 consideraron seguros finalmente fueron vulnerados (Bellare, Desai, Pointcheval & Rogaway, 1998; Camp-Winget, Housley, Wagner & Walker, 2003;Shannon, 1949), todas las 谩reas relacionadas con la seguridad en la informaci贸n han presentado un gran desarrollo. Este desarrollo incluye la consolidaci贸n y surgimiento de nuevas alternativas para el manejo seguro de datos.…”
Section: Introductionunclassified
“…But many people are not aware of the Denial of Service (DoS) attacks. Number of studies have been taken to avoid DoS attacks [3,4] and different security protocols were also proposed and implemented over WLAN such as 802.11i [5], Wired Equivalent Privacy (WEP) [1,6], Wi-Fi Protected Access (WPA) [2], 802.11 [7,8], 802.11b [9], 802.1x and 802.1w [10,11]. None of them provide specific solution to avoid DoS attacks [12,13].…”
Section: Introductionmentioning
confidence: 99%