Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Security problems in 802.11-based networks

Published: 01 May 2003 Publication History

Abstract

Assessing inherent wireless network security deficiencies and seeking solutions.

References

[1]
Arbaugh, W.A. An Inductive Chosen Plaintext Attack Against WEP and WEP2. IEEE 802.11 Working Group IEEE 802.11-01/230; www.cs.umd.edu/~waa/attack/frame.htm, 2001.]]
[2]
Arbaugh, W.A., Shankar, N. and Wan, Y.J. Your 802.11 wireless network has no clothes. In Proceedings of the First International Conference on Wireless LANs and Home Networks (Singapore, 2001), 131--144.]]
[3]
Borisov, N., Goldberg, I., and Wagner, D. Intercepting mobile communications: The insecurity of 802.11. In Proceedings of the International Conference on Mobile Computing and Networking (July 2001), 180--189.]]
[4]
Fluhrer, S., Mantin, I., and Shamir, A. Weaknesses in the key schedule algorithm of RC4. In Proceedings of the 4th Annual Workshop on Selected Areas of Cryptography, 2001.]]
[5]
Frankel, S. Demystifying the IPsec Puzzle. Artech House, Boston, MA, 2001.]]
[6]
Walker, J. Unsafe at any key size: An analysis of the WEP encapsulation. IEEE 802.11 Task Group E IEEE 802.11/00-362; grouper.ieee.org/ groups/802/11/Documents/DocumentHolder/0-362.zip.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 46, Issue 5
Wireless networking security
May 2003
84 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/769800
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2003
Published in CACM Volume 46, Issue 5

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)172
  • Downloads (Last 6 weeks)36
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)A Secure Authentication Protocol for IoT-WLAN Using EAP FrameworkIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.338846722:1(49-65)Online publication date: 1-Jan-2025
  • (2024)Security in Wireless Networks and DevicesGuide to Computer Network Security10.1007/978-3-031-47549-8_19(443-473)Online publication date: 20-Jan-2024
  • (2020)Security in Wireless Networks and DevicesGuide to Computer Network Security10.1007/978-3-030-38141-7_18(399-428)Online publication date: 4-Jun-2020
  • (2018)An efficient dynamic key based EAP authentication framework for future IEEE 802.1x Wireless LANsProceedings of the 2nd International Conference on Digital Signal Processing10.1145/3193025.3193047(125-131)Online publication date: 25-Feb-2018
  • (2017)Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifierWireless Networks10.1007/s11276-016-1300-523:8(2431-2446)Online publication date: 1-Nov-2017
  • (2017)Security in Wireless Networks and DevicesGuide to Computer Network Security10.1007/978-3-319-55606-2_18(397-427)Online publication date: 26-Apr-2017
  • (2015)Scrutinizing WPA2 password generating algorithms in wireless routersProceedings of the 9th USENIX Conference on Offensive Technologies10.5555/2831211.2831221(10-10)Online publication date: 10-Aug-2015
  • (2015)Security in Wireless Networks and DevicesGuide to Computer Network Security10.1007/978-1-4471-6654-2_18(391-419)Online publication date: 21-Jan-2015
  • (2013)Complete EAP MethodIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2012.16424:4(672-680)Online publication date: 1-Apr-2013
  • (2012)Route Optimized Secured and Improved Encryption Protocol for Wireless Ad Hoc NetworkProceedings of the 2012 International Conference on Advances in Mobile Network, Communication and Its Applications10.1109/MNCApps.2012.12(34-38)Online publication date: 1-Aug-2012
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media