Please use this identifier to cite or link to this item:
https://rfos.fon.bg.ac.rs/handle/123456789/463Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.creator | Prodanović, Radomir | |
| dc.creator | Simić, Dejan | |
| dc.date.accessioned | 2023-05-12T10:06:10Z | - |
| dc.date.available | 2023-05-12T10:06:10Z | - |
| dc.date.issued | 2007 | |
| dc.identifier.issn | 1330-1136 | |
| dc.identifier.uri | https://rfos.fon.bg.ac.rs/handle/123456789/463 | - |
| dc.description.abstract | Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. The paper also gives a summary of security improvements of WEP protocol that can lead to a higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparsion to the previous security solutions. | en |
| dc.publisher | University of Zagreb | |
| dc.rights | openAccess | |
| dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
| dc.source | Journal of Computing and Information Technology | |
| dc.subject | WLAN safety improvements | en |
| dc.subject | WEP protocol | en |
| dc.subject | TKIP | en |
| dc.subject | Security threats to 802.11 | en |
| dc.subject | RC4 | en |
| dc.subject | Integrity | en |
| dc.subject | Deficiencies ofWEP | en |
| dc.subject | Confidentiality | en |
| dc.subject | Authentication | en |
| dc.subject | AES | en |
| dc.subject | 802.1x | en |
| dc.title | A survey of wireless security | en |
| dc.type | article | |
| dc.rights.license | BY-NC-ND | |
| dc.citation.epage | 255 | |
| dc.citation.issue | 3 | |
| dc.citation.other | 15(3): 237-255 | |
| dc.citation.spage | 237 | |
| dc.citation.volume | 15 | |
| dc.identifier.doi | 10.2498/cit.1000877 | |
| dc.identifier.fulltext | http://prototype2.rcub.bg.ac.rs/bitstream/id/1024/459.pdf | |
| dc.identifier.rcub | conv_3100 | |
| dc.identifier.scopus | 2-s2.0-80052499574 | |
| dc.type.version | publishedVersion | |
| item.cerifentitytype | Publications | - |
| item.fulltext | With Fulltext | - |
| item.grantfulltext | open | - |
| item.openairetype | article | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
| Appears in Collections: | Radovi istraživača / Researchers’ publications | |
This item is licensed under a Creative Commons License
