Comparison of wireless security protocols

被引:0
|
作者
Zhou, T [1 ]
Yu, Q [1 ]
Liu, H [1 ]
机构
[1] Univ Massachusetts, ECE Dept, N Dartmouth, MA 02747 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wired Equivalent Protocol(WEP) is the security protocol on MAC layer of WLAN, implemented by IEEE 802.11. Although widely used today, its obvious security holes are already pointed out by researchers[l]. Therefore, several new security protocols, such like Temporal Key Integrity Protocol(TKIP), Protected Extensible Authentication Protocol(PEAP), WEP2 and Synchronized Random Numbers Generator(SPRiNG) protocol, are proposed to quickly fill the gaping hole left by WEP. This paper is to analyze and compare these four protocols and then make a conclusion.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 50 条
  • [21] Formal analysis of some timed security properties in wireless protocols
    Gorrieri, R
    Martinelli, F
    Petrocchi, M
    Vaccarelli, A
    FORMAL METHODS FOR OPEN OBJECT-BASED DISTRIBUTED SYSTEMS, PROCEEDINGS, 2003, 2884 : 139 - 154
  • [22] Formal Security Verification of Transport Protocols for Wireless Sensor Networks
    Vinh-Thong Ta
    Dvir, Amit
    Buttyan, Levente
    ADVANCED COMPUTATIONAL METHODS FOR KNOWLEDGE ENGINEERING, 2014, 282 : 389 - 403
  • [23] Security mechanisms and data access protocols in innovative wireless networks
    Pathan, Al-Sakib Khan
    Azad, Saiful
    Khan, Rasib
    Caviglione, Luca
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (09):
  • [24] Integrated Protocols to Ensure Security Services in Wireless Sensor Networks
    Faisal, Mohammed
    Al-Muhtadi, Jalal
    Al-Dhelaan, Abdullah
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [25] PROPOSAL OF SECURITY PROTOCOLS FOR THE LOCAL WIRELESS NETWORK OF THE CIENFUEGOS UNIVERSITY
    Gonzalez Paz, Alex
    Beltran Casanova, David
    Fuentes Gari, Ernesto Roberto
    REVISTA UNIVERSIDAD Y SOCIEDAD, 2016, 8 (04): : 128 - 135
  • [26] Eye Tracking Sensors as a Contactless Interfaces in Wireless Security Protocols
    Ogiela, Marek R.
    Ogiela, Lidia
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 290 - 291
  • [27] Introduction to the special session on wireless protocols security & hardware implementations
    Sklavos, N
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 757 - 758
  • [28] Review of Platforms and Security Protocols suitable for Wireless Sensor Networks
    Moeller, S.
    Newe, T.
    Lochmann, S.
    2009 IEEE SENSORS, VOLS 1-3, 2009, : 1001 - +
  • [29] A review of threats, protocols, and solutions to enhance the security of wireless networks
    Ataelmanan, Somya Khidir Mohmmed
    Al Hassan, Mostafa Ahmed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (04): : 108 - 115
  • [30] On a framework for energy-efficient security protocols in wireless networks
    Prasithsangaree, P
    Krishnamurthy, P
    COMPUTER COMMUNICATIONS, 2004, 27 (17) : 1716 - 1729