Open Access
ITM Web Conf.
Volume 7, 2016
3rd Annual International Conference on Information Technology and Applications (ITA 2016)
Article Number 03001
Number of page(s) 5
Section Session 3: Security
Published online 21 November 2016
  1. Abdallah C T, Jordan R. Wireless Communications Networking: and An Overview[J]. 2002. [Google Scholar]
  2. Sheldon F T, Weber J M, Yoo S M, et al. The insecurity of wireless networks[J]. Security & Privacy, IEEE, 2012, 10(4): 54–61. [CrossRef] [Google Scholar]
  3. Wang L, Srinivasan B, Bhattacharjee N. Security analysis and improvements on WLANs[J]. Journal of Networks, 2011, 6(3): 470–481. [CrossRef] [Google Scholar]
  4. Dacosta I, Chakradeo S, Ahamad M, et al. One-time cookies: Preventing session hijacking attacks with stateless authentication tokens[J]. ACM Transactions on Internet Technology (TOIT), 2012, 12(1): 1. [CrossRef] [Google Scholar]
  5. Waliullah M, Moniruzzaman A B M, Rahman M S. An Experimental Study Analysis of Security Attacks at IEEE 802.11 Wireless Local Area Network[J]. International Journal of Future Generation Communication and Networking, 2015, 8(1): 9–18. [CrossRef] [Google Scholar]
  6. Bernaschi M, Ferreri F, Valcamonici L. Access points vulnerabilities to DoS attacks in 802.11 networks[J]. Wireless Networks, 2008, 14(2): 159–169. [CrossRef] [Google Scholar]
  7. Hwang H, Jung G, Sohn K, et al. A study on MITM (Man in the Middle) vulnerability in wireless network using 802.1 X and EAP[C]//Information Science and Security, 2008. ICISS. International Conference on. IEEE, 2008: 164–170. [Google Scholar]
  8. Mathews M, Hunt R. Evolution of wireless LAN security architecture to IEEE 802.11 I (WPA2)[C]//Proceedings of the fourth IASTED Asian Conference on Communication Systems and Networks. 2007. [Google Scholar]
  9. Parhi S.Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey[J]. International Journal of Computer Network and Information Security, 2012, 4(3): 31. [CrossRef] [Google Scholar]
  10. Li J, Garuba M. Encryption as an Effective Tool in Reducing Wireless LAN Vulnerabilities[C]//Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on. IEEE, 2008: 557–562. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.