Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
Computer Science and Information Systems, Tome 3 (2006) no. 2.

Voir la notice de l'article provenant de la source Computer Science and Information Systems website

Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparison to the previous security solutions. A proposal of possible security improvements of RSNA (Robust Security Network Association) is presented.
@article{CSIS_2006_3_2_a6,
     author = {Radomir Prodanovi\'c and Dejan Simi\'c},
     title = {Holistic {Approach} to {Wep} {Protocol} in {Securing} {Wireless} {Network} {Infrastructure}},
     journal = {Computer Science and Information Systems},
     publisher = {mathdoc},
     volume = {3},
     number = {2},
     year = {2006},
     url = {http://geodesic.mathdoc.fr/item/CSIS_2006_3_2_a6/}
}
TY  - JOUR
AU  - Radomir Prodanović
AU  - Dejan Simić
TI  - Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
JO  - Computer Science and Information Systems
PY  - 2006
VL  - 3
IS  - 2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/CSIS_2006_3_2_a6/
ID  - CSIS_2006_3_2_a6
ER  - 
%0 Journal Article
%A Radomir Prodanović
%A Dejan Simić
%T Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure
%J Computer Science and Information Systems
%D 2006
%V 3
%N 2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/CSIS_2006_3_2_a6/
%F CSIS_2006_3_2_a6
Radomir Prodanović; Dejan Simić. Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure. Computer Science and Information Systems, Tome 3 (2006) no. 2. http://geodesic.mathdoc.fr/item/CSIS_2006_3_2_a6/