Please use this identifier to cite or link to this item: https://rfos.fon.bg.ac.rs/handle/123456789/378
Full metadata record
DC FieldValueLanguage
dc.creatorProdanović, Radomir
dc.creatorSimić, Dejan
dc.date.accessioned2023-05-12T10:01:47Z-
dc.date.available2023-05-12T10:01:47Z-
dc.date.issued2006
dc.identifier.issn1820-0214
dc.identifier.urihttps://rfos.fon.bg.ac.rs/handle/123456789/378-
dc.description.abstractConstant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication confidentiality and integrity. The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparison to the previous security solutions. A proposal of possible security improvements of RSNA (Robust Security Network Association) is presented.en
dc.publisherComSIS Consortium
dc.rightsopenAccess
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.sourceComputer Science and Information Systems / ComSIS
dc.titleHolistic approach to Wep protocol in securing wireless network infrastructureen
dc.typearticle
dc.rights.licenseBY-NC-ND
dc.citation.epage113
dc.citation.issue2
dc.citation.other3(2): 97-113
dc.citation.spage97
dc.citation.volume3
dc.identifier.fulltexthttp://prototype2.rcub.bg.ac.rs/bitstream/id/991/374.pdf
dc.identifier.rcubconv_1038
dc.type.versionpublishedVersion
item.cerifentitytypePublications-
item.fulltextWith Fulltext-
item.grantfulltextopen-
item.openairetypearticle-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
Appears in Collections:Radovi istraživača / Researchers’ publications
Files in This Item:
File Description SizeFormat 
374.pdf288.53 kBAdobe PDFThumbnail
View/Open
Show simple item record

Google ScholarTM

Check


This item is licensed under a Creative Commons License Creative Commons