Comparison of wireless security protocols

被引:0
|
作者
Zhou, T [1 ]
Yu, Q [1 ]
Liu, H [1 ]
机构
[1] Univ Massachusetts, ECE Dept, N Dartmouth, MA 02747 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wired Equivalent Protocol(WEP) is the security protocol on MAC layer of WLAN, implemented by IEEE 802.11. Although widely used today, its obvious security holes are already pointed out by researchers[l]. Therefore, several new security protocols, such like Temporal Key Integrity Protocol(TKIP), Protected Extensible Authentication Protocol(PEAP), WEP2 and Synchronized Random Numbers Generator(SPRiNG) protocol, are proposed to quickly fill the gaping hole left by WEP. This paper is to analyze and compare these four protocols and then make a conclusion.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 50 条
  • [31] Signal-flow-based analysis of wireless security protocols
    Capar, Cagatay
    Goeckel, Dennis
    Paterson, Kenneth G.
    Quaglia, Elizabeth A.
    Towsley, Don
    Zafer, Murtaza
    INFORMATION AND COMPUTATION, 2013, 226 : 37 - 56
  • [32] Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
    Schaller, Patrick
    Schmidt, Benedikt
    Basin, David
    Capkun, Srdjan
    PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 109 - 123
  • [33] A Comparison Study for Different Wireless Sensor Network Protocols
    Al-Baadani, Faris
    Yousef, Sufian
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 252 - 259
  • [34] Communication protocols for wireless sensor networks: A survey and comparison
    Ketshabetswe, Lucia Keleadile
    Zungeru, Adamu Murtala
    Mangwala, Mmoloki
    Chuma, Joseph M.
    Sigweni, Boyce
    HELIYON, 2019, 5 (05)
  • [35] Comparison of Clustering Routing Protocols for Wireless Sensor Networks
    Sikander, Gulbadan
    Zafar, Mohammad Haseeb
    Babar, Mohammad Inayatullah Khan
    Rashid, Mohammed
    Zuhairi, Megat Farez
    2013 IEEE INTERNATIONAL CONFERENCE ON SMART INSTRUMENTATION, MEASUREMENT AND APPLICATIONS (ICSIMA 2013), 2013,
  • [36] Opportunistic Routing Protocols in Wireless Networks: A Performance Comparison
    Darehshoorzadeh, Amir
    Boukerche, Azzedine
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 2504 - 2509
  • [37] Comparison of clustering algorithms and protocols for wireless sensor networks
    Arboleda, Liliana M.
    Nasser, Nidal
    2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 1267 - +
  • [38] Implementation and Comparison of Clustering Techniques in Wireless Routing Protocols
    Saini, Davinder S.
    Dubey, Chinmay
    Rathor, Shalender
    Sisodia, Ravinder
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 159 - 162
  • [39] Automated verification of wireless security protocols using layered proving trees
    Data Communication Security Laboratory, University of Limerick, Limerick, Ireland
    WSEAS Trans. Commun., 2006, 2 (252-258):
  • [40] Security analysis of application layer protocols on wireless local area networks
    Yang M.-H.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 586 - 592