Secure Authentication in WLAN Using Modified Four-Way Handshake Protocol

[1]  Xinyu Xing,et al.  Security Analysis and Authentication Improvement for IEEE 802.11i Specification , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[2]  Arash Habibi Lashkari,et al.  A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[3]  Manoj Kumar,et al.  CT image denoising based on complex wavelet transform using local adaptive thresholding and Bilateral filtering , 2015, WCI '15.

[4]  Jyh-Cheng Chen,et al.  Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience , 2005, IEEE Commun. Mag..

[5]  Dijiang Huang,et al.  IEEE 802.11 Wireless LAN Control Frame Protection , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[6]  Pardeep Kumar,et al.  Clouds: Concept to optimize the Quality of Service (QOS) for clusters , 2011, 2011 World Congress on Information and Communication Technologies.

[7]  Manoj Diwakar,et al.  CT image denoising using multivariate model and its method noise thresholding in non-subsampled shearlet domain , 2020, Biomed. Signal Process. Control..

[8]  Niranjan Lal,et al.  Text Security using 2D Cellular Automata Rules , 2013 .

[9]  Yu Cheng,et al.  Security Analysis of Camera File Transfer Over Wi-Fi , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[10]  Floriano De Rango,et al.  Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i , 2006, EURASIP J. Wirel. Commun. Netw..

[11]  M.A. Khan,et al.  Pseudo Random Number Based authentication to counter denial of service attacks on 802.11 , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).

[12]  Rizal Munadi,et al.  Simple Prevention of Advanced Stealth Man-in-The-Middle Attack in WPA2 Wi-Fi Networks , 2019, 2019 International Conference on Electrical Engineering and Computer Science (ICECOS).

[13]  Sheila E. Frankel,et al.  Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .

[14]  Chris Imafidon,et al.  Addressing the vulnerability of the 4-way handshake of 802.11i , 2008, 2008 Third International Conference on Digital Information Management.

[15]  Hyunseung Choo,et al.  A Robust Session Key Distribution in 802.11i , 2008, 2008 International Conference on Computational Sciences and Its Applications.

[16]  Matthew S Gast 802.11 Wireless Networks: The Definitive Guide, Second Edition , 2005 .

[17]  Yao Yao,et al.  Enhancing RC4 algorithm for WLAN WEP protocol , 2010, 2010 Chinese Control and Decision Conference.

[18]  Deng Shiyang Compare of new security strategy with several others in WLAN , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[19]  David R. Cheriton,et al.  DoS and authentication in wireless public access networks , 2002, WiSE '02.

[20]  Jyh-Cheng Chen,et al.  Wireless LAN security and IEEE 802.11i , 2005, IEEE Wirel. Commun..

[21]  John C. Mitchell,et al.  Analysis of the 802.11i 4-way handshake , 2004, WiSe '04.

[22]  Y. Challal,et al.  Enhanced WEP: An efficient solution to WEP threats , 2005, Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005..

[23]  Paul Arana,et al.  Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2) , 2006 .

[24]  Arash Habibi Lashkari,et al.  Wired Equivalent Privacy (WEP) , 2009, 2009 International Conference on Future Computer and Communication.

[25]  Thomas J. Owens,et al.  Access mechanisms in Wi-Fi networks state of art, flaws and proposed solutions , 2010, 2010 17th International Conference on Telecommunications.

[26]  Arash Habibi Lashkari,et al.  Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA) , 2009, 2009 International Conference on Signal Processing Systems.

[27]  G. Noel,et al.  An integrated security model for WLAN , 2009, AFRICON 2009.