Comparison of wireless security protocols

被引:0
|
作者
Zhou, T [1 ]
Yu, Q [1 ]
Liu, H [1 ]
机构
[1] Univ Massachusetts, ECE Dept, N Dartmouth, MA 02747 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wired Equivalent Protocol(WEP) is the security protocol on MAC layer of WLAN, implemented by IEEE 802.11. Although widely used today, its obvious security holes are already pointed out by researchers[l]. Therefore, several new security protocols, such like Temporal Key Integrity Protocol(TKIP), Protected Extensible Authentication Protocol(PEAP), WEP2 and Synchronized Random Numbers Generator(SPRiNG) protocol, are proposed to quickly fill the gaping hole left by WEP. This paper is to analyze and compare these four protocols and then make a conclusion.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 50 条
  • [1] A COMPARISON BETWEEN WIRELESS LAN SECURITY PROTOCOLS
    Turab, Nidal
    Moldoveanu, Florica
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2009, 71 (01): : 61 - 80
  • [2] Security Survey of the IoT Wireless Protocols
    Krejci, Radek
    Hujnak, Ondrej
    Svepes, Marek
    2017 25TH TELECOMMUNICATION FORUM (TELFOR), 2017, : 60 - 63
  • [3] Bioinspired Security Analysis of Wireless Protocols
    Petrocchi, Marinella
    Spognardi, Angelo
    Santi, Paolo
    MOBILE NETWORKS & APPLICATIONS, 2016, 21 (01): : 139 - 148
  • [4] Security Protocols for Wireless Sensor Networks
    Bhalla, Monika
    Pandey, Nitin
    Kumar, Brijesh
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1005 - 1009
  • [5] Bioinspired Security Analysis of Wireless Protocols
    Marinella Petrocchi
    Angelo Spognardi
    Paolo Santi
    Mobile Networks and Applications, 2016, 21 : 139 - 148
  • [6] Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    Mayes, Keith
    Bonnefoi, Pierre-Francois
    Sauveron, Damien
    Chaumette, Serge
    2016 IEEE/AIAA 35TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2016,
  • [7] Comparison of security protocols in mobile wireless environments: Tradeoffs between level of security obtained and battery life
    Osorio, Fernando C. Colon
    McKay, Kerry
    Agu, Emmanuel
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 268 - 280
  • [8] A Calculus for the Analysis of Wireless Network Security Protocols
    Ballardin, Francesco
    Merro, Massimo
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 206 - 222
  • [9] Security protocols in wireless tactical sensor networks
    Vergados, Dimitrios D.
    Stergiou, Giannis
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1463 - 1469
  • [10] Quantitative analysis of security protocols in wireless networks
    Best, P
    Namuduri, K
    Pendse, R
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 290 - 291