Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP)
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography
On Message Integrity in Cryptographic Protocols
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Analysis of the SSL 3.0 protocol
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Problem areas for the IP security protocols
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
DoS and authentication in wireless public access networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Why security standards sometimes fail
Communications of the ACM
Enabling trusted software integrity
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
Data Security Issues Arising from Integration of Wireless Access into Healthcare Networks
Journal of Medical Systems
Metropolitan Area Mobile Services to Support Virtual Groups
IEEE Transactions on Mobile Computing
System Software for Ubiquitous Computing
IEEE Pervasive Computing
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS ...
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Lessons Learned in Implementing and Deploying Crypto Software
Proceedings of the 11th USENIX Security Symposium
Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption
Proceedings of the 11th USENIX Security Symposium
Networking: wireless (In)security
Sys Admin
Security problems in 802.11-based networks
Communications of the ACM - Wireless networking security
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
Strategies for enhancing routing security in protocols for mobile ad hoc networks
Journal of Parallel and Distributed Computing - Special issue on Routing in mobile and wireless ad hoc networks
The Dangers of Mitigating Security Design Flaws: A Wireless Case Study
IEEE Security and Privacy
MobiCom poster: public-key-based secure Internet access
ACM SIGMOBILE Mobile Computing and Communications Review
Security and privacy issues of handheld and wearable wireless devices
Communications of the ACM - Why CS students need math
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Network solutions for home health care applications
Technology and Health Care
Security proofs for an efficient password-based key exchange
Proceedings of the 10th ACM conference on Computer and communications security
Authenticity in a reliable protocol for mobile computing
Proceedings of the 2003 ACM symposium on Applied computing
Emerging challenges in designing secure mobile appliances
Ambient intelligence
A certificate revocation scheme for wireless ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
Weaknesses in the temporal key hash of WPA
ACM SIGMOBILE Mobile Computing and Communications Review
Autonomic 802.11 Wireless LAN Security Auditing
IEEE Security and Privacy
Security of a Mobile Transaction: A Trust Model
Electronic Commerce Research
IBM Systems Journal
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Security considerations for IEEE 802.15.4 networks
Proceedings of the 3rd ACM workshop on Wireless security
Analysis of the 802.11i 4-way handshake
Proceedings of the 3rd ACM workshop on Wireless security
A framework for wireless LAN monitoring and its applications
Proceedings of the 3rd ACM workshop on Wireless security
Towards service and user discovery on wireless networks
Proceedings of the second international workshop on Mobility management & wireless access protocols
Network selection and discovery of service information in public WLAN hotspots
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Provable Cryptographic Security and its Applications to Mobile Wireless Computing
Wireless Personal Communications: An International Journal
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
A smartcard for authentication in WLANs
LANC '03 Proceedings of the 2003 IFIP/ACM Latin America conference on Towards a Latin American agenda for network research
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
iMASH: interactive mobile application session handoff
Proceedings of the 1st international conference on Mobile systems, applications and services
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
Application of synchronous dynamic encryption system in mobile wireless domains
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
A modular correctness proof of IEEE 802.11i and TLS
Proceedings of the 12th ACM conference on Computer and communications security
Wireless identification -- privacy and security
BT Technology Journal
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
A natural language approach to automated cryptanalysis of two-time pads
Proceedings of the 13th ACM conference on Computer and communications security
Access control protocols with two-layer architecture for wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improving the security of industrial networks by means of formal verification
Computer Standards & Interfaces
On the impact of quality of protection in wireless local area networks with IP mobility
Mobile Networks and Applications
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Dependability in Wireless Networks: Can We Rely on WiFi?
IEEE Security and Privacy
Key management for long-lived sensor networks in hostile environments
Computer Communications
Algorithms and heuristics for efficient medical information display in PDA
Computers in Biology and Medicine
EURASIP Journal on Wireless Communications and Networking
Information Sciences: an International Journal
Improving network security using genetic algorithm approach
Computers and Electrical Engineering
A solution to spoofed PS-poll based denial of service attacks in IEEE 802.11 WLANs
ICCOM'07 Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11
Hierarchical combination of intruder theories
Information and Computation
Identifying unique devices through wireless fingerprinting
WiSec '08 Proceedings of the first ACM conference on Wireless network security
International Journal of Wireless and Mobile Computing
On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures
International Journal of Wireless and Mobile Computing
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
International Journal of Wireless and Mobile Computing
The proactive intrusion prevention for Wireless Local Area Network
International Journal of Mobile Communications
Can Ferris Bueller still have his day off? protecting privacy in the wireless era
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Proximity breeds danger: emerging threats in metro-area wireless networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Virtual private networks over a wireless infrastructure: evaluation and performance analys
ICCOMP'05 Proceedings of the 9th WSEAS International Conference on Computers
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
What ought a program committee to do?
WOWCS'08 Proceedings of the conference on Organizing Workshops, Conferences, and Symposia for Computer Systems
What ought a program committee to do?
WOWCS'08 Proceedings of the conference on Organizing Workshops, Conferences, and Symposia for Computer Systems
A performance analysis of the spring protocol through simulation
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Computer Communications
A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutions
EC-Web '08 Proceedings of the 9th international conference on E-Commerce and Web Technologies
WSEAS TRANSACTIONS on COMMUNICATIONS
New directions in privacy-preserving anomaly detection for network traffic
Proceedings of the 1st ACM workshop on Network data anonymization
When cryptography meets storage
Proceedings of the 4th ACM international workshop on Storage security and survivability
Security issues in m-government
International Journal of Electronic Security and Digital Forensics
Multi-gateway association in wireless mesh networks
Ad Hoc Networks
RAP: protecting commodity wi-fi networks from rogue access points
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Nonce Generators and the Nonce Reset Problem
ISC '09 Proceedings of the 12th International Conference on Information Security
From qualitative to quantitative proofs of security properties using first-order conditional logic
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 1
Fast track article: Bringing law and order to IEEE 802.11 networks-A case for DiscoSec
Pervasive and Mobile Computing
Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs
Computer Communications
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A cross-layer authentication design for secure video transportation in wireless sensor network
International Journal of Security and Networks
Approximating Imperfect Cryptography in a Formal Model
Electronic Notes in Theoretical Computer Science (ENTCS)
A Quantitative Study of Two Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2)
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
A study of the performance of SSL on PDAs
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Evaluation of quality of protection adding HVM in wireless network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures
Theoretical Computer Science
Strong user authentication in IEEE802.11 wireless LAN
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
A practical study on security of agent-based ubiquitous computing
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Two-way Handshake protocol for improved security in IEEE 802.11 wireless LANs
Computer Communications
On RSN-oriented wireless intrusion detection
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Passive-only key recovery attacks on RC4
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Breaking 104 Bit WEP in less than 60 seconds
WISA'07 Proceedings of the 8th international conference on Information security applications
EPSON: enhanced physical security in OFDM networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
IEEE Communications Magazine
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
IEEE Transactions on Wireless Communications
ARBOR: hang together rather than hang separately in 802.11 wifi networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi
Proceedings of the 12th ACM international conference on Ubiquitous computing
WiFi and WiMAX secure deployments
Journal of Computer Systems, Networks, and Communications - Special issue on WiMAX, LTE, and WiFi interworking
Mapping the urban wireless landscape with Argos
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
DSPM: dynamic security policy management for optimizing performance in wireless networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Security of IEEE 802.16 in mesh mode
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
802.11 wireless network policy recommendation for usage within unclassified government networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Aegis: physical space security for wireless networks with smart antennas
IEEE/ACM Transactions on Networking (TON)
Improved key management scheme for IEEE 802.11
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Crypt analysis of two time pads in case of compressed speech
Computers and Electrical Engineering
Security improvement on a group key exchange protocol for mobile networks
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
Implementing disposable credit card numbers by mobile phones
Electronic Commerce Research
Group key agreement protocol among mobile devices in different cells
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
Developing provable secure m-commerce applications
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
The security proof of a 4-way handshake protocol in IEEE 802.11i
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Security analysis of michael: the IEEE 802.11i message integrity code
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Security threats and countermeasures in WLAN
AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
A novel key management and distribution solution for secure video multicast
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Secure group communications over combined wired and wireless networks
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Sequence number-based MAC address spoof detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
RIDA: robust intrusion detection in ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Hierarchical combination of intruder theories
RTA'06 Proceedings of the 17th international conference on Term Rewriting and Applications
Cryptography in theory and practice: the case of encryption in IPsec
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Adaptation of IEEE 802.1x for secure session establishment between ethernet peers
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Adaptive E-learning GRID platform
1LeGE-WG'02 Proceedings of the 1st LEGE-WG international conference on Educational Models for GRID Based Services
Mutual authentication and group key agreement for low-power mobile devices
Computer Communications
On a framework for energy-efficient security protocols in wireless networks
Computer Communications
Designing the API for a cryptographic library: a misuse-resistant application programming interface
Ada-Europe'12 Proceedings of the 17th Ada-Europe international conference on Reliable Software Technologies
IR, DR and BC with wireless mesh networks
Proceedings of the 2012 Information Security Curriculum Development Conference
Γ-MAC[H, P]: a new universal MAC scheme
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
McOE: a family of almost foolproof on-line authenticated encryption schemes
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Secure data transmission with cloud computing in heterogeneous wireless networks
Security and Communication Networks
Contemporary Issues in Handheld Computing Research
International Journal of Handheld Computing Research
Technology Innovation and the Policy Vacuum: A Call for Ethics, Norms, and Laws to Fill the Void
International Journal of Technoethics
A Probability Problem Arising from the Security of the Temporal Key Hash of WPA
Wireless Personal Communications: An International Journal
Two ID-based authenticated schemes with key agreement for mobile environments
The Journal of Supercomputing
A formal methodology for integral security design and verification of network protocols
Journal of Systems and Software
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic
LICS '13 Proceedings of the 2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science
Hi-index | 0.02 |
The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from mis-application of cryptographic primitives. The flaws lead to a number of practical attacks that demonstrate that WEP fails to achieve its security goals. In this paper, we discuss in detail each of the flaws, the underlying security principle violations, and the ensuing attacks.