About: Reasoning about Security Issues in Wireless Devices based on the IEEE 802.11     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
Description
  • This papers deals with a security provided by the Wireless Networks based on the IEEE 802.11 standard. This standard specifies the Wired Equivalent Privacy (WEP) encapsulation of 802.11 data frames to provide confidentiality, access control, and data integrity. WEP appends a 32-bit CRC checksum to each outgoing frame, and then encrypts it with RC4 using 40- or 104-bit message-key plus a 24-bit random initialization vector. WEP also decrypts each incoming frame with the message-key, and validates the CRCC checksum. In this protocol, RC4 and the shared message-key are used for confidentiality and access control, and CRC checksum for data integrity. However, WEP has been shown to fail to meet its design goals. Use of RC4 for data privacy and CRC-32 for data integrity is due mainly to their speed and ease of implementation, but they do not provide cryptographically-secure encryption and authentication.<br>Many serious security flaws have been exposed in these two design choices. These security flaws can i
  • This papers deals with a security provided by the Wireless Networks based on the IEEE 802.11 standard. This standard specifies the Wired Equivalent Privacy (WEP) encapsulation of 802.11 data frames to provide confidentiality, access control, and data integrity. WEP appends a 32-bit CRC checksum to each outgoing frame, and then encrypts it with RC4 using 40- or 104-bit message-key plus a 24-bit random initialization vector. WEP also decrypts each incoming frame with the message-key, and validates the CRCC checksum. In this protocol, RC4 and the shared message-key are used for confidentiality and access control, and CRC checksum for data integrity. However, WEP has been shown to fail to meet its design goals. Use of RC4 for data privacy and CRC-32 for data integrity is due mainly to their speed and ease of implementation, but they do not provide cryptographically-secure encryption and authentication.<br>Many serious security flaws have been exposed in these two design choices. These security flaws can i (en)
  • Tento příspěvek se zabývá bezpečností zařízení založených na standardu IEEE 802.11. Je zmíněna problematika technologie WEP, bezpečnosti RC4 šifry&nbsp;a některých dalších zabezpečovacích mechanismů (např. access-control list), které se používají v uvedených zařízeních. (cs)
Title
  • Bezpečnost bezdrátových zařízení založených na standardu IEEE 802.11 (cs)
  • Reasoning about Security Issues in Wireless Devices based on the IEEE 802.11
  • Reasoning about Security Issues in Wireless Devices based on the IEEE 802.11 (en)
skos:prefLabel
  • Bezpečnost bezdrátových zařízení založených na standardu IEEE 802.11 (cs)
  • Reasoning about Security Issues in Wireless Devices based on the IEEE 802.11
  • Reasoning about Security Issues in Wireless Devices based on the IEEE 802.11 (en)
skos:notation
  • RIV/00216305:26230/04:PU49142!RIV/2005/GA0/262305/N
http://linked.open.../vavai/riv/strany
  • 228-231
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • P(GA102/02/1032)
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 583712
http://linked.open...ai/riv/idVysledku
  • RIV/00216305:26230/04:PU49142
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • wireless, security, IEEE 802.11, authentication, WEP (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...ontrolniKodProRIV
  • [C8E407B6F967]
http://linked.open...v/mistoKonaniAkce
  • Brno
http://linked.open...i/riv/mistoVydani
  • Brno
http://linked.open...i/riv/nazevZdroje
  • 11th Electronic Devices and Systems Conference 2004 Proceedings
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...cetTvurcuVysledku
http://linked.open...vavai/riv/projekt
http://linked.open...UplatneniVysledku
http://linked.open...iv/tvurceVysledku
  • Očenášek, Pavel
http://linked.open...vavai/riv/typAkce
http://linked.open.../riv/zahajeniAkce
number of pages
http://purl.org/ne...btex#hasPublisher
  • Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií
https://schema.org/isbn
  • 80-214-2701-9
http://localhost/t...ganizacniJednotka
  • 26230
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 58 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software