6 ieee std 8021x 2004 ieee standard for local and

Info icon This preview shows pages 39–41. Sign up to view the full content.

6. IEEE Std. 802.1X-2004, IEEE Standard for Local and metropoli- tan area networks - Port-Based Network Access Control June, 2001. 7. B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, Ed., Extensible Authentication Protocol (EAP) , RFC 3748, June 2004. 8. C. Rigney, S. Willens, A. Rubens, W. Simpson, Remote Authentication Dial In User Service (RADIUS) , RFC 2865, June 2000. 9. P. Calhoun, J. Loughney, E. Guttman, G. Zorn, J. Arkko, Diameter Base Protocol , RFC 3588, September 2003. 10. D. Whiting, R. Housley, N. Ferguson, Counter with CBC-MAC (CCM) , RFC 3610, September 2003. 11. L. Zhou and Z. J. Haas. Securing Ad hoc networks, IEEE Network Magazine, 13(6), November/December 1999. Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 39

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Authentication and Confidentiality in Wireless Ad Hoc Networks 27 12. H. Luo and S. Lu. Ubiquitous and robust authentication services for ad hoc wireless networks, Proceedings of 7th IEEE Symposium on Computers and Communications, July 2002. 13. Keoh, S. L. and Lupu, E. 2002. Towards flexible credential verification in mobile ad-hoc networks. In Proceedings of the Second ACM international Workshop on Principles of Mobile Computing Toulouse, France, October 2002. POMC ’02. 14. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for MANET,” in Proc. IEEE ICNP, 2001, pp. 251-260. 15. M. Junaid, Muid Mufti, M. Umar Ilyas, Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol , Transactions on Engineering, Computing and Technology V11, February 2006. 16. Aboudagga, N., Refaei, M. T., Eltoweissy, M., DaSilva, L. A., and J. Quisquater. Authentication protocols for ad hoc networks: taxonomy and research issues. In Proceedings of the 1st ACM international Workshop on Quality of Service and Security in Wireless and Mobile Networks (Q2SWinet ’05). Montreal, Quebec, Canada, October 2005. 17. Hongmei Deng; Mukherjee, A.; Agrawal, D.P., Threshold and identity-based key management and authentication for wireless ad hoc networks , In pro- ceedings of International Conference on Information Technology: Coding and Computing (ITCC 2004). pages 107-111 Vol. 1, April 2004. 18. Changhua He, John C Mitchell, Analysis of the 802.11i 4-Way Handshake , WiSE’04, Philadelphia, Pennsylvania, USA, October 2004. 19. Arunesh Mishra, William A. Arbaugh, An Initial Security Analysis of the IEEE 802.1X Standard , Technical Report CS-TR-4328, Depart- ment of Computer Science, University of Marryland. February 2002. 20. W. A. Arbaugh. An inductive chosen plaintext attack against WEP/WEP2.
Image of page 40
Image of page 41
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • Public key infrastructure, ........., Public-key cryptography, Pretty Good Privacy

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern