Studying IEEE-802.11 encryption protocol M. Oduro, A. Poguda
Material type: ArticleContent type: Текст Media type: электронный Subject(s): беспроводные сети | протоколы шифрованияGenre/Form: статьи в сборниках Online resources: Click here to access online In: Инноватика - 2020 : сборник материалов XVI Международной школы-конференции студентов, аспирантов и молодых ученых, 23-25 апреля 2020 г., г. Томск, Россия С. 555-558Abstract: From the inception of wireless network in 1997, wireless network has enabled us to communicate over the internet without wired network. It has also grown exponentially over the past three decades and it is ubiquitous of all humans’ activities. As the wireless communication expands, so does wireless network threats. The IEEE in conjugation with Wi-Fi Alliance provides wireless encryption protocols: WEP, WPA, and WPA2.The article will look into the various weaknesses, strengths and attacks of each encryption protocols.Библиогр.: 12 назв.
From the inception of wireless network in 1997, wireless network has enabled us to communicate over the internet without wired network. It has also grown exponentially over the past three decades and it is ubiquitous of all humans’ activities. As the wireless communication expands, so does wireless network threats. The IEEE in conjugation with Wi-Fi Alliance provides wireless encryption protocols: WEP, WPA, and WPA2.The article will look into the various weaknesses, strengths and attacks of each encryption protocols.
There are no comments on this title.