Comparison of wireless security protocols

被引:0
|
作者
Zhou, T [1 ]
Yu, Q [1 ]
Liu, H [1 ]
机构
[1] Univ Massachusetts, ECE Dept, N Dartmouth, MA 02747 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wired Equivalent Protocol(WEP) is the security protocol on MAC layer of WLAN, implemented by IEEE 802.11. Although widely used today, its obvious security holes are already pointed out by researchers[l]. Therefore, several new security protocols, such like Temporal Key Integrity Protocol(TKIP), Protected Extensible Authentication Protocol(PEAP), WEP2 and Synchronized Random Numbers Generator(SPRiNG) protocol, are proposed to quickly fill the gaping hole left by WEP. This paper is to analyze and compare these four protocols and then make a conclusion.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 50 条
  • [41] Security Analysis of Application Layer Protocols on Wireless Local Area Networks
    杨明豪
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (05) : 586 - 592
  • [42] Hierarchical Routing Protocols of Wireless Sensor Networks: A Comparison
    Bakheet, Mohammed Al Fatih
    2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), 2015, : 107 - 113
  • [43] Performance Comparison of Routing Protocols in Wireless Sensor Networks
    Ganda, Geetika
    Prachi
    Mittal, Shaily
    INFORMATION TECHNOLOGY AND MOBILE COMMUNICATION, 2011, 147 : 379 - 383
  • [44] Data Link Layer Security Protocols in Wireless Sensor Networks: A Survey
    AlMheiri, Saleha Mubarak
    AlQamzi, Hend Saeed
    2013 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2013, : 312 - 317
  • [45] Security analysis of two anonymous authentication protocols for distributed wireless networks
    Wong, DS
    Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 284 - 288
  • [46] A Review of Security Protocols in mHealth Wireless Body Area Networks (WBAN)
    Kang, James
    Adibi, Sasan
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015, 2015, 523 : 61 - 83
  • [47] Privacy and Security in Wireless Sensor Networks: Protocols, Algorithms, and Efficient Architectures
    Saponara, Sergio
    Solanas, Agusti
    Avoine, Gildas
    Neri, Bruno
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2013, 2013
  • [48] On certificate-based security protocols for wireless mobile communication systems
    Park, CS
    IEEE NETWORK, 1997, 11 (05): : 50 - 55
  • [49] A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols
    Tomic, Ivana
    McCann, Julie A.
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1910 - 1923
  • [50] Model checking wireless sensor network security protocols:: TinySec + LEAP
    Tobarra, Llanos
    Cazorla, Diego
    Cuartero, Fernando
    Diaz, Gregorio
    Cambronero, Emilia
    WIRELESS SENSOR AND ACTOR NETWORKS, 2007, : 95 - +