|
[1] Arunesh Mishra, Minho Shin, and William Arbaugh, An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process (http://www.cs.umd.edu/~waa/pubs/handoff-lat-acm.pdf) [2] Chris Grier, Mike Perry, and Andy Washington, Wireless Security (http://fscked.org/proj/minihax/WirelessSec/) [3] Jesse Walker, 802.11 Key Management series: Part I, Key Management for WEP and TKIP (http://cedar.intel.com/media/pdf/wireless/80211_1.pdf) [4] Jesse Walker, 802.11 Security Series: Part II, The temporal Key Integrity Protocol (TKIP) (http://cedar.intel.com/media/pdf/security/80211_part2.pdf) [5] Jesse Walker, Overview of 802.11 Security, March 2001 (http://grouper.ieee.org/groups/802/15/pub/2001/Mar01/01154r0P802-15_TG3-Overview-of-802-11-Security.ppt) [6] Kaj J. Grahn, Goran Pulkkis, and Jean-Sebastien Guillard, Security of Mobile and Wireless Networks, June 2002. [7] Nikita Borisov, Ian Goldberg, and David Wagner, Intercepting Mobile Communications: The Insecurity of 802.11, July 2001. (http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html) [8] Sangheon Pack and Yanghee Choi, Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model, 2002 [9] W. A. Arbaugh, N. Shankar, and Y. J. Wan., Your 802.11 wireless network has no clothes. (http://www.cs.umd.edu/~waa/wireless.pdf) [10] Yi-Bing Lin, and Imrich Chlamtac, Wireless and Mobile Network Architecture, pp. 164-165, 2001. [11] ETSI ETS 300 929 (GSM 03.20 version 5.1.1) Security related network functions. [12] IEEE Std 802.11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999. [13] IEEE Std 802.1X Port-Based Network Access Control, 2001. [14] IEEE Std 802.11i/D3.0, Wireless LAN Medium Access (MAC) and physical layer (PHY) specifications: Specification for Enhanced Security, November 2002. [15] IETF RFC 1994 PPP Challenge Handshake Authentication Protocol (CHAP), August 1996 [16] IETF RFC 2104 HMAC: Keyed-Hashing for Message Authentication, February 1997. [17] IETF RFC 2284 PPP Extensible Authentication Protocol (EAP), March 1998. [18] IETF RFC 2865 Remote Authentication Dial In User Service (RADIUS), June 2000. [19] IETF internet draft Diameter Base Protocol, December 2002. (http://www.ietf.org/internet-drafts/draft-ietf-aaa-diameter-17.txt ) [20] IETF internet draft EAP SIM authentication, February 2003. (http://www.ietf.org/internet-drafts/ draft-haverinen-pppext-eap-sim-10.txt ) [21] http://www.gsmworld.com/news/statistics/substats.shtml [22] http://www.cs.umd.edu/~waa/wireless.html [23] http://www.cisco.com/warp/public/707/32.pdf [24] http://citeseer.nj.nec.com/fluhrer01weaknesses.html [25] http://www.cs.berkeley.edu/~daw/my-posts/my-rc4-weak-keys
|