An analysis of WLAN security mechanisms of wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) discovers that the current literature is not totally creditable in its judgment on the security value of W...An analysis of WLAN security mechanisms of wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) discovers that the current literature is not totally creditable in its judgment on the security value of WEP and WPA. Based on the respective performances of WEP and WPA under certain typical attacks, this paper substantiates the judgment that WEP has quite a few vulnerabilities concerning confidentiality and integrity, but at the same time challenges the judgment on WPA with that WPA is robust enough to confront potential typical attacks and is not so unreliable as the current literature believes, although it has some vulnerabilities in its message integrity code (MIC).展开更多
A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a ...A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a smartphone,which is compared with the database located in a remote server.The proposed scheme can detect not only fake access point(Fake AP)but also Evil Twin AP.It can be a user-oriented solution to detecting Rogue AP threats,and users can use it flexibly.展开更多
文摘An analysis of WLAN security mechanisms of wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) discovers that the current literature is not totally creditable in its judgment on the security value of WEP and WPA. Based on the respective performances of WEP and WPA under certain typical attacks, this paper substantiates the judgment that WEP has quite a few vulnerabilities concerning confidentiality and integrity, but at the same time challenges the judgment on WPA with that WPA is robust enough to confront potential typical attacks and is not so unreliable as the current literature believes, although it has some vulnerabilities in its message integrity code (MIC).
基金The KCC(Korea Communications Commission),Korea,under the R&D program supervised by the KCA(Korea Communications Agency)(KCA-2012-08-911-05-001)
文摘A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a smartphone,which is compared with the database located in a remote server.The proposed scheme can detect not only fake access point(Fake AP)but also Evil Twin AP.It can be a user-oriented solution to detecting Rogue AP threats,and users can use it flexibly.