|
[1] http://www.winpcap.org/. [2] http://www.wu-ftpd.org/. [3] “Wi-fi protected access,” http://www.wi-fi.org/. [4] “Advanced Encryption Standard (AES),” FIPS PUB 197, Nov. 2001. [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf [5] B. Aboba and D. Simon, “PPP EAP TLS Authentication Protocol,” RFC 2716 (Informational),1996. [6] IEEE Standard for Information technology — telecommunications and information exchange between systems - Local and metropolitan area networks- Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Medium Access Control (MAC) Security Enhancements, Amendment to ISO/IEC 8802-11/1999(I) ANSI/IEEE Std 802.11,1999 edition, 2004. [7] W. A. Arbaugh, N. Shankar, and Y. J. Wan, “Your 802.11 Network has no Clothes,” in Proceedings of the First IEEE International Conference on Wireless LANs and Home Networks, Dec. 2001, pp. 131–144. [8] D. B. Faria and D. R. Cheriton, “DoS and Authentication in Wireless Public Access Networks,” in Proceedings of the Third ACM Workshop on Wireless Security (WiSE’02), 2002, pp. 47–56. [9] S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the Key Scheduling Algorithm of RC4,” in Proceedings of 8th Annual Workshop on Selected Areas of Cryptography, Toronto, Aug. 2001, pp. 1–24. [10] J. Hall, M. Barbeau, and E. Kranakis, “Detecting Rogue Devices in Bluetooth Networks Using Radio Frequency Fingerprinting,” in Proceedings of the 15th International Conference on Computer Communications and Networks (ICCCN’06), Oct. 2006. [11] IEEE Standard for Local and metropolitan area networks Port-Based Network Access Control, IEEE Std 802.1X-2004 (Revision of IEEE Std 802.1X-2001), 2004. [12] A. Mishra, N. L. Petroni, and W. A. Arbaugh, “Security Issues in IEEE 802.11 Wireless Local-Area Networks: A Survey,” Wireless Communications and Mobile Computing Journal, vol. 4, no. 8, pp. 821–833, 2004. [13] J. S. Park and D. Dicoi, “WLAN Security: Current and Future,” IEEE Internet Computing, vol. 7, no. 5, pp. 60–65, Sept. 2003. [14] S. Schmid, J. Finney, M. Wu, A. Friday, A. Scott, and D. Shepherd, “An Access Control Architecture for Metropolitan Area Wireless Networks,” in Proceedings of the 8th Interactive Distributed Multimedia Systems and telecommunication Services (IDMS), Nov. 2001, pp. 29–37. [15] Z. Wan, R. H. Deng, F. Bao, and A. L. Ananda, “Access Control Protocols with Two-layer Architecture for Wireless Networks,” Computer Networks, vol. 51, pp. 655–670, Feb. 2007. [16] H. Wang, A. Prasad, P. Schoo, K. Bayarou, and S. Rohr, “Security mechanisms and security analysis: hotspot WLANs and inter-operator roaming,” in Vehicular Technology Conference, 2004. VTC 2004-Spring. 2004 IEEE 59th, May 2004, pp. 2492–2496. [17] Best Current Practices for Wireless Internet Service Provider (WISP) Roaming, v1.0 ed., Wi-Fi Alliance, Feb. 2003.
|