DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3
hits: 27
1.
  • How is your Wi-Fi connectio... How is your Wi-Fi connection today? DoS attacks on WPA3-SAE
    Chatzoglou, Efstratios; Kambourakis, Georgios; Kolias, Constantinos Journal of information security and applications, February 2022, 2022-02-00, Volume: 64
    Journal Article
    Peer reviewed
    Open access

    WPA3-Personal renders the Simultaneous Authentication of Equals (SAE) password-authenticated key agreement method mandatory. The scheme achieves forward secrecy and is highly resistant to offline ...
Full text
Available for: UL

PDF
2.
  • A Chosen Random Value Attac... A Chosen Random Value Attack on WPA3 SAE Authentication Protocol
    Sun, Sheng Digital threats (Print), 06/2022, Volume: 3, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Simultaneous Authentication of Equals (SAE) is a password-authenticated key exchange protocol that is designed to replace the WPA2-PSK-based authentication. The SAE authenticated key exchange ...
Full text
Available for: UL

PDF
3.
  • Empirical Evaluation of Att... Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset
    Chatzoglou, Efstratios; Kambourakis, Georgios; Kolias, Constantinos IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    This work serves two key objectives. First, it markedly supplements and extends the well-known AWID corpus by capturing and studying traces of a wide variety of attacks hurled in the IEEE 802.1X ...
Full text
Available for: UL

PDF
4.
  • ANALYZING AND EVALUATING TH... ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY
    Shadeed Al-Mejibli, Intisar; Rasheed Alharbe, Dr. Nawaf Iraqi journal for computers and informatics (Online), 06/2020, Volume: 46, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been ...
Full text
Available for: UL

PDF
5.
  • Lightweight real-time WiFi-... Lightweight real-time WiFi-based intrusion detection system using LightGBM
    Bhutta, Areeb Ahmed; Nisa, Mehr un; Mian, Adnan Noor Wireless networks, 02/2024, Volume: 30, Issue: 2
    Journal Article
    Peer reviewed

    Attacks on WiFi networks can cause network failures and denial of service for authentic users. To identify such attacks, the deployment of a WiFi Intrusion Detection System (IDS) is crucial. The key ...
Full text
Available for: UL
6.
  • Exploiting WiFi usability f... Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls
    Chatzisofroniou, George; Kotzanikolaou, Panayiotis Journal of computer security, 01/2022, Volume: 30, Issue: 3
    Journal Article
    Peer reviewed

    Association attacks aim to manipulate WiFi clients into associating with a malicious access point, by exploiting protocol vulnerabilities and usability features implemented on the network managers of ...
Full text
Available for: UL
7.
  • A Comprehensive Attack Flow... A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3
    Kohlios, Christopher P.; Hayajneh, Thaier Electronics (Basel), 11/2018, Volume: 7, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    The presence of wireless communication grows undeniably more prevalent each year. Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks (WLAN) in 1997, technologies have ...
Full text
Available for: UL

PDF
8.
  • A Wireless Intrusion Detection System for 802.11 WPA3 Networks
    Dalal, Neil; Akhtar, Nadeem; Gupta, Anubhav ... 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2022-Jan.-4
    Conference Proceeding
    Open access

    Wi-Fi (802.11) networks have become an essential part of our daily lives; hence, their security is of utmost importance. However, Wi-Fi Protected Access 3 (WPA3), the latest security certification ...
Full text
Available for: UL

PDF
9.
  • Towards Understanding and E... Towards Understanding and Enhancing Association and Long Sleep in Low-Power WiFi IoT Systems
    Ramanna, Vikram Kumar; Sheth, Jaykumar; Liu, Simon ... IEEE transactions on green communications and networking, 12/2021, Volume: 5, Issue: 4
    Journal Article

    Enhancing the energy efficiency of WiFi IoT stations introduces unique challenges compared to 802.15.4 and BLE. The four essential operations performed to ensure connectivity between stations and the ...
Full text
Available for: UL
10.
  • Wireless Security Protocols... Wireless Security Protocols WPA3: A Systematic Literature Review
    Halbouni, Asmaa; Ong, Lee-Yeng; Leow, Meng-Chew IEEE access, 2023, Volume: 11
    Journal Article
    Peer reviewed
    Open access

    The size of wireless networks and the number of wireless devices are growing daily. A crucial part of wireless security involves preventing unauthorized access by using wireless security protocols in ...
Full text
Available for: UL
1 2 3
hits: 27

Load filters