首页    期刊浏览 2024年12月01日 星期日
登录注册

文章基本信息

  • 标题:Comparative Study of Attacks on Security Protocols
  • 本地全文:下载
  • 作者:Lakshmi Kurup ; Vidhi Shah ; Dhaval Shah
  • 期刊名称:International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
  • 印刷版ISSN:2278-1323
  • 出版年度:2014
  • 卷号:3
  • 期号:8
  • 页码:2885-2888
  • 出版社:Shri Pannalal Research Institute of Technolgy
  • 摘要:During the last decade, wireless networks have become increasingly popular. Wireless networks are cheap and the main advantage is mobility and lack of cables. However, they are prone to a variety of threats like denial of service, chop-chop attack, replay attacks, man-in-the-middle and data modification. With growing popularity the threats to wireless networks have also increased significantly in the last few years. WLAN security has evolved in the last decade and this evolution occurred in three main phases. This paper gives a general idea of these three security schemes designed to protect wireless networks from such threats. We then present the vulnerabilities of each of these three schemes. We have studied the threats and attacks against each of these mechanisms in great detail. Along with their detailed description, we have also provided possible solutions and preventive measures. Using these preventive measures it is possible to get the best security out of these mechanisms.
  • 关键词:AES (Advanced Encryption Standard); ; IEEE802.11x; Wireless LAN; WEP (Wireless Equivalent ; Privacy); WPA (Wi-Fi Protected Access); TKIP ; (Temporal Key Integrity Protocol)
国家哲学社会科学文献中心版权所有