Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
IEEE Transactions on Wireless Communications
WLAN security performance study
NEHIPISIC'11 Proceeding of 10th WSEAS international conference on electronics, hardware, wireless and optical communications, and 10th WSEAS international conference on signal processing, robotics and automation, and 3rd WSEAS international conference on nanotechnology, and 2nd WSEAS international conference on Plasma-fusion-nuclear physics
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
Attack trace generation of cryptographic protocols based on coloured Petri nets model
International Journal of Wireless and Mobile Computing
Modelling context-aware RBAC models for mobile business processes
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven that the WEP protocol fails to provide data confidentiality and authentication. This paper first introduces the WEP as well as all kinds of attacks. Then, two approaches to enhance the WEP are proposed to overcome some known vulnerabilities and thus to provide better data confidentiality and authentication. Finally, simulation methodology is presented and simulation results are provided. Our studies show that the proposed enhancements provide better data confidentiality with some degree of computing cost as the trade-off.