Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Data and Computer Communications and Computer Networking with internet Protocols and Technology: Opnet Lab Manual to Accompany the seventh edition and fourth edition
Your 80211 wireless network has no clothes
IEEE Wireless Communications
Hi-index | 0.00 |
The security of general wireless network protocols is based on a wired equivalent privacy (WEP) protocol. Many researches point out that WEP involved a lot of security weaknesses. The wireless network based on WEP is not secure at all. This paper proposes a new key management scheme (named improved WEP*) that is compatible to IEEE 802.11 standard. The scheme not only improves confidentiality, but also enhances the integrity functions. The access point (AP) and host authenticate each other in the proposed scheme. The connection of the AP and host do not interrupt in the proposed scheme except the deadline of connection service expire, while the Wool's WEP* has to take more extra process and time to continues the connection by security consideration.