A secure wifi system for wireless networks: An experimental evaluation

被引:10
作者
Aljawarneh S. [1 ]
Masadeh S. [1 ]
Alkhateeb F. [2 ]
机构
[1] Faculty of Science and Information Technology, Isra University
[2] IT Faculty, Yarmouk University, Irbid
关键词
D O I
10.1016/S1353-4858(10)70081-7
中图分类号
学科分类号
摘要
Many web-based organisations have been penetrated through unsecured Internet sessions over TCP/IP networks. These unsecured sessions are targeted by hackers to illegally capture sensitive information. Securing these sessions, especially across wireless networks, is crucial. Here we examine a novel method of securing the data transmitted over wireless networks - a secure wifi (sWiFi) system.
引用
收藏
页码:6 / 12
页数:6
相关论文
共 18 条
[1]  
Bono S.C., Green M., Stubblefield A., Juels A., Rubin A.D., Szydlo M., Security analysis of a cryptographically-enabled RFID device, SSYM'05: Proceedings of the 14th Conference on USENIX Security Symposium, (2005)
[2]  
Schneier B., Kelsey J., Unbalanced Feistel networks and block cipher design, Proceedings of the Third International Workshop on Fast 12 Software Encryption
[3]  
Polimon J., Hernandez-Castro J.C., Estevez-Tapiador J.M., Ribagorda A., Automated design of a lightweight block cipher with genetic programming, Int J Know-Based Intell Eng Syst, 12, 1, pp. 3-14, (2008)
[4]  
Guajardo J., Skoric B., Tuyls P., Kumar S.S., Bel T., Blom A.H., Schrijen G.J., Anti-counterfeiting, key distribution and key storage in an ambient world via physical unclonable functions, Information Systems Frontiers, 11, 1, pp. 19-41, (2009)
[5]  
Shadi Masadeh W.S., End to end keyless self encrypting/decrypting streaming cipher, Information Technology & National Security Conference, (2007)
[6]  
Schweitzer D., Boleng J., Designing web labs for teaching security concepts, J Comput Small Coll, 25, 2, pp. 39-45, (2009)
[7]  
Brown B., 802.11: The security differences between b and i, IEEE Potentials, 22, pp. 23-27, (2003)
[8]  
Nadeem Myj. A., A performance comparison of data encryption algorithms, First International Conference on Information and Communication Technologies, 84, (2005)
[9]  
Elkilani W.S., Performance of encryption techniques for real-time video streaming, Networking and Media Convergence, 130, (2009)
[10]  
Bleichenbacher D., Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard pkcs1, pp. 1-12, (1998)