Wireless LANs and Home Networks 2001
DOI: 10.1142/9789812799562_0013
|View full text |Cite
|
Sign up to set email alerts
|

Your 802.11 Wireless Network Has No Clothes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
107
0
2

Year Published

2006
2006
2018
2018

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 160 publications
(109 citation statements)
references
References 2 publications
0
107
0
2
Order By: Relevance
“…Next, Nikita Borisov, Ian Goldberg, and David Wagner at the University of California, Berkeley, independently found the same problems as well as new ones [37]. Arbaugh, Shankar, and Wan at the University of Maryland identified flaws in the access control and authentication methods in 2001 [38]. Fluhrer, Mantin, and Shamir broke the mode in which RC4 was being used in 802.11 [39], and finally Arbaugh and Petroni demonstrated that the mitigation technique to prevent the Fluhrer attack actually made the problem worse [40].…”
Section: Security Problemsmentioning
confidence: 93%
“…Next, Nikita Borisov, Ian Goldberg, and David Wagner at the University of California, Berkeley, independently found the same problems as well as new ones [37]. Arbaugh, Shankar, and Wan at the University of Maryland identified flaws in the access control and authentication methods in 2001 [38]. Fluhrer, Mantin, and Shamir broke the mode in which RC4 was being used in 802.11 [39], and finally Arbaugh and Petroni demonstrated that the mitigation technique to prevent the Fluhrer attack actually made the problem worse [40].…”
Section: Security Problemsmentioning
confidence: 93%
“…In many cases, wireless solutions were adopted and implemented without due consideration for the information security risks introduced (Arbaugh et al, 2002). Many organizations implemented wireless networks as an extension to existing wired networks, with default settings, resulting in "open" networks.…”
Section: Potential Loss Of Valuementioning
confidence: 99%
“…The initial approach to WLAN security was called Wired Equivalent Privacy (WEP) and proved to be a security disaster [3]- [6]. Later, IEEE 802.11i [7] and the related WPA and WPA2 provided more substantial authentication, integrity, and confidentiality protection.…”
Section: Introductionmentioning
confidence: 99%