期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Security Mechanisms of Wired Equivalent Privacy and Wi-Fi Protected Access in WLAN:Review and Analysis
1
作者 张显石 康戈文 王新珩 《Journal of Southwest Jiaotong University(English Edition)》 2009年第1期16-21,共6页
An analysis of WLAN security mechanisms of wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) discovers that the current literature is not totally creditable in its judgment on the security value of W... An analysis of WLAN security mechanisms of wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) discovers that the current literature is not totally creditable in its judgment on the security value of WEP and WPA. Based on the respective performances of WEP and WPA under certain typical attacks, this paper substantiates the judgment that WEP has quite a few vulnerabilities concerning confidentiality and integrity, but at the same time challenges the judgment on WPA with that WPA is robust enough to confront potential typical attacks and is not so unreliable as the current literature believes, although it has some vulnerabilities in its message integrity code (MIC). 展开更多
关键词 wlan security WEP WPA Temporal key integrity protocol (TKIP)
在线阅读 下载PDF
Scheme of Rogue AP detection in managed WLAN based on AP's location
2
作者 Kwontaek Lim Jiawei Shao +1 位作者 Jonghoon Lee Souhwan Jung 《Journal of Measurement Science and Instrumentation》 CAS 2012年第4期370-373,共4页
A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a ... A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a smartphone,which is compared with the database located in a remote server.The proposed scheme can detect not only fake access point(Fake AP)but also Evil Twin AP.It can be a user-oriented solution to detecting Rogue AP threats,and users can use it flexibly. 展开更多
关键词 rogue access point(Rogue AP) wireless local area network(wlan security Evil Twin attacks
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部