[go: up one dir, main page]

Jain et al., 2022 - Google Patents

Penetration Testing of Wireless EncryptionProtocols

Jain et al., 2022

Document ID
11333113166668899005
Author
Jain S
Pruthi S
Yadav V
Sharma K
Publication year
Publication venue
2022 6th International Conference on Computing Methodologies and Communication (ICCMC)

External Links

Snippet

Due to its flexibility, portability, and simplicity of accessibility, the use of wireless networks as a communication medium has skyrocketed. As more devices join a wireless network, valuable and sensitive data is sent over the air between users, making it easy for attackers to …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols

Similar Documents

Publication Publication Date Title
Kissi et al. Penetration testing of IEEE 802.11 encryption protocols using Kali Linux hacking tools
Khasawneh et al. A survey on Wi-Fi protocols: WPA and WPA2
CN103795728A (en) EAP authentication method capable of hiding identities and suitable for resource-constrained terminal
Abo-Soliman et al. A study in WPA2 enterprise recent attacks
Brown 802.11: the security differences between b and i
Noh et al. Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography
Akram et al. Real time exploitation of security mechanisms of residential WLAN access points
Vink et al. A comprehensive taxonomy of wi-fi attacks
Jain et al. Penetration Testing of Wireless EncryptionProtocols
Asante et al. Analysis of security vulnerabilities in wifi-protected access pre-shared key
Adbeib Comprehensive study on wi-fi security protocols by analyzing wep, wpa, and wpa2
Kumar et al. Analysis and literature review of IEEE 802.1 x (Authentication) protocols
Alsahlany et al. Experimental Evaluation of Different Penetration Security Levels in Wireless Local Area Network.
Raju et al. Secure Hotspot a novel approach to secure public Wi-Fi hotspot
Abo-Soliman et al. Tunnel-Based EAP Effective Security Attacks WPA2 Enterprise Evaluation and Proposed Amendments
Yang et al. Security in wireless local area networks
Turab et al. A comparison between wireless LAN security protocols
Pandikumar et al. Wi-Fi security and test bed implementation for WEP and WPA cracking
Agbeboaye et al. Security threats analysis of wireless local area network
Chaudhary et al. Vulnerability Analysis of WPA Security Protocols
Murugesan et al. Closed WiFi Hotspot-Truly Hidden Network
Ajay et al. Automated WPA2 cracking using improved dictionary and WPS PIN attack
van Oorschot Wireless lan security: 802.11 and wi-fi
Ghanim et al. Evaluating the effectiveness of WPA3 protocol against advanced hacking attacks
Pervaiz et al. Security in wireless local area networks