Jain et al., 2022 - Google Patents
Penetration Testing of Wireless EncryptionProtocolsJain et al., 2022
- Document ID
- 11333113166668899005
- Author
- Jain S
- Pruthi S
- Yadav V
- Sharma K
- Publication year
- Publication venue
- 2022 6th International Conference on Computing Methodologies and Communication (ICCMC)
External Links
Snippet
Due to its flexibility, portability, and simplicity of accessibility, the use of wireless networks as a communication medium has skyrocketed. As more devices join a wireless network, valuable and sensitive data is sent over the air between users, making it easy for attackers to …
- 230000035515 penetration 0 title abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0485—Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kissi et al. | Penetration testing of IEEE 802.11 encryption protocols using Kali Linux hacking tools | |
| Khasawneh et al. | A survey on Wi-Fi protocols: WPA and WPA2 | |
| CN103795728A (en) | EAP authentication method capable of hiding identities and suitable for resource-constrained terminal | |
| Abo-Soliman et al. | A study in WPA2 enterprise recent attacks | |
| Brown | 802.11: the security differences between b and i | |
| Noh et al. | Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography | |
| Akram et al. | Real time exploitation of security mechanisms of residential WLAN access points | |
| Vink et al. | A comprehensive taxonomy of wi-fi attacks | |
| Jain et al. | Penetration Testing of Wireless EncryptionProtocols | |
| Asante et al. | Analysis of security vulnerabilities in wifi-protected access pre-shared key | |
| Adbeib | Comprehensive study on wi-fi security protocols by analyzing wep, wpa, and wpa2 | |
| Kumar et al. | Analysis and literature review of IEEE 802.1 x (Authentication) protocols | |
| Alsahlany et al. | Experimental Evaluation of Different Penetration Security Levels in Wireless Local Area Network. | |
| Raju et al. | Secure Hotspot a novel approach to secure public Wi-Fi hotspot | |
| Abo-Soliman et al. | Tunnel-Based EAP Effective Security Attacks WPA2 Enterprise Evaluation and Proposed Amendments | |
| Yang et al. | Security in wireless local area networks | |
| Turab et al. | A comparison between wireless LAN security protocols | |
| Pandikumar et al. | Wi-Fi security and test bed implementation for WEP and WPA cracking | |
| Agbeboaye et al. | Security threats analysis of wireless local area network | |
| Chaudhary et al. | Vulnerability Analysis of WPA Security Protocols | |
| Murugesan et al. | Closed WiFi Hotspot-Truly Hidden Network | |
| Ajay et al. | Automated WPA2 cracking using improved dictionary and WPS PIN attack | |
| van Oorschot | Wireless lan security: 802.11 and wi-fi | |
| Ghanim et al. | Evaluating the effectiveness of WPA3 protocol against advanced hacking attacks | |
| Pervaiz et al. | Security in wireless local area networks |