Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
IEEE Security and Privacy
Building Wireless Community Community Networks
Building Wireless Community Community Networks
Physically Locating Wireless Intruders
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
SWAN: A Secure Wireless LAN Architecture
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
International Journal of Mobile Communications
A mobile agent protected scheme using pairing-based cryptosystems
International Journal of Mobile Communications
Wireless in the enterprise: requirements, solutions and research directions
International Journal of Mobile Communications
An efficient wireless transmission method for m-commerce
International Journal of Mobile Communications
OFDM over IEEE 802.11b hardware for telemedical applications
International Journal of Mobile Communications
Wireless trust: conceptual and operational definition
International Journal of Mobile Communications
International Journal of Mobile Communications
Mobile collaborative learning using multicast MANETs
International Journal of Mobile Communications
International Journal of Mobile Communications
Hi-index | 0.00 |
IEEE 802.11b utilises WEP for data encryption to strengthen wireless security. However, WEP is proven to be insecure and its secret key can be cracked within only a short period of time. This research, in consideration of increasing need in WLAN security enhancements, attempts to devise a solution to prevent adversaries by developing a Wireless Intrusion Prevention System (WIPS) to detect and prevent War-driving and WEP attacks. An implementation of the WIPS is described in this paper as an illustration of the feasibility of the proposed architecture and results are presented.