Loading…
WEP-based security management in IEEE 802.11 wireless sensor networks
With the normalization of the 802.11 standard and the emergence of Wi-Fi low-cost devices, some sensor network testbeds use this wireless technology. WEP, the protocol handling 802.11 security, is finally a flawed protocol. The TKIP protocol has been standardized to solve these security problems in...
Saved in:
Main Author: | |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 4 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Guyot, V. |
description | With the normalization of the 802.11 standard and the emergence of Wi-Fi low-cost devices, some sensor network testbeds use this wireless technology. WEP, the protocol handling 802.11 security, is finally a flawed protocol. The TKIP protocol has been standardized to solve these security problems in infrastructure environments with access points. Unfortunately, 802.11 sensor networks remain unsafe. To solve this security problem in sensor networks, we use smart cards to handle the actual WEP-based 802.11 networking adapters. |
doi_str_mv | 10.1109/CANET.2007.4401682 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4401682</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4401682</ieee_id><sourcerecordid>4401682</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-169f3a09230a688f3f108410239bcecaab1c2c7a97fe7c4ade064095074e636e3</originalsourceid><addsrcrecordid>eNotj91KAzEUhAMiKHVfQG_yAlvPSWJ-LssStVCqFwtelmx6VqLdrSQrpW_vgr0aGIaZbxi7R1gigntsVlvfLgWAWSoFqK24YpUzFpVQCmcbb1hVyhcAoNEKpLhl_sO_110otOeF4m9O05kPYQyfNNA48TTytfeeWxDzBj-lTAcqZc6O5Zj5SNPpmL_LHbvuw6FQddEFa59927zWm7eXdbPa1MnBVKN2vQzghISgre1lj2BnMCFdFymG0GEU0QRnejJRhT3BTOmewCjSUpNcsIf_2kREu5-chpDPu8tX-Qf1kkg9</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>WEP-based security management in IEEE 802.11 wireless sensor networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Guyot, V.</creator><creatorcontrib>Guyot, V.</creatorcontrib><description>With the normalization of the 802.11 standard and the emergence of Wi-Fi low-cost devices, some sensor network testbeds use this wireless technology. WEP, the protocol handling 802.11 security, is finally a flawed protocol. The TKIP protocol has been standardized to solve these security problems in infrastructure environments with access points. Unfortunately, 802.11 sensor networks remain unsafe. To solve this security problem in sensor networks, we use smart cards to handle the actual WEP-based 802.11 networking adapters.</description><identifier>ISBN: 9781424410071</identifier><identifier>ISBN: 142441007X</identifier><identifier>ISBN: 1424410061</identifier><identifier>ISBN: 9781424410064</identifier><identifier>DOI: 10.1109/CANET.2007.4401682</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access protocols ; Authentication ; Communication system security ; Cryptography ; Engines ; Intelligent sensors ; Network servers ; Smart cards ; Wireless sensor networks ; Wrapping</subject><ispartof>2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 2007, p.1-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4401682$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4401682$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Guyot, V.</creatorcontrib><title>WEP-based security management in IEEE 802.11 wireless sensor networks</title><title>2007 3rd IEEE/IFIP International Conference in Central Asia on Internet</title><addtitle>CANET</addtitle><description>With the normalization of the 802.11 standard and the emergence of Wi-Fi low-cost devices, some sensor network testbeds use this wireless technology. WEP, the protocol handling 802.11 security, is finally a flawed protocol. The TKIP protocol has been standardized to solve these security problems in infrastructure environments with access points. Unfortunately, 802.11 sensor networks remain unsafe. To solve this security problem in sensor networks, we use smart cards to handle the actual WEP-based 802.11 networking adapters.</description><subject>Access protocols</subject><subject>Authentication</subject><subject>Communication system security</subject><subject>Cryptography</subject><subject>Engines</subject><subject>Intelligent sensors</subject><subject>Network servers</subject><subject>Smart cards</subject><subject>Wireless sensor networks</subject><subject>Wrapping</subject><isbn>9781424410071</isbn><isbn>142441007X</isbn><isbn>1424410061</isbn><isbn>9781424410064</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj91KAzEUhAMiKHVfQG_yAlvPSWJ-LssStVCqFwtelmx6VqLdrSQrpW_vgr0aGIaZbxi7R1gigntsVlvfLgWAWSoFqK24YpUzFpVQCmcbb1hVyhcAoNEKpLhl_sO_110otOeF4m9O05kPYQyfNNA48TTytfeeWxDzBj-lTAcqZc6O5Zj5SNPpmL_LHbvuw6FQddEFa59927zWm7eXdbPa1MnBVKN2vQzghISgre1lj2BnMCFdFymG0GEU0QRnejJRhT3BTOmewCjSUpNcsIf_2kREu5-chpDPu8tX-Qf1kkg9</recordid><startdate>200709</startdate><enddate>200709</enddate><creator>Guyot, V.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200709</creationdate><title>WEP-based security management in IEEE 802.11 wireless sensor networks</title><author>Guyot, V.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-169f3a09230a688f3f108410239bcecaab1c2c7a97fe7c4ade064095074e636e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Access protocols</topic><topic>Authentication</topic><topic>Communication system security</topic><topic>Cryptography</topic><topic>Engines</topic><topic>Intelligent sensors</topic><topic>Network servers</topic><topic>Smart cards</topic><topic>Wireless sensor networks</topic><topic>Wrapping</topic><toplevel>online_resources</toplevel><creatorcontrib>Guyot, V.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Guyot, V.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>WEP-based security management in IEEE 802.11 wireless sensor networks</atitle><btitle>2007 3rd IEEE/IFIP International Conference in Central Asia on Internet</btitle><stitle>CANET</stitle><date>2007-09</date><risdate>2007</risdate><spage>1</spage><epage>4</epage><pages>1-4</pages><isbn>9781424410071</isbn><isbn>142441007X</isbn><isbn>1424410061</isbn><isbn>9781424410064</isbn><abstract>With the normalization of the 802.11 standard and the emergence of Wi-Fi low-cost devices, some sensor network testbeds use this wireless technology. WEP, the protocol handling 802.11 security, is finally a flawed protocol. The TKIP protocol has been standardized to solve these security problems in infrastructure environments with access points. Unfortunately, 802.11 sensor networks remain unsafe. To solve this security problem in sensor networks, we use smart cards to handle the actual WEP-based 802.11 networking adapters.</abstract><pub>IEEE</pub><doi>10.1109/CANET.2007.4401682</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424410071 |
ispartof | 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 2007, p.1-4 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4401682 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access protocols Authentication Communication system security Cryptography Engines Intelligent sensors Network servers Smart cards Wireless sensor networks Wrapping |
title | WEP-based security management in IEEE 802.11 wireless sensor networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T01%3A14%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=WEP-based%20security%20management%20in%20IEEE%20802.11%20wireless%20sensor%20networks&rft.btitle=2007%203rd%20IEEE/IFIP%20International%20Conference%20in%20Central%20Asia%20on%20Internet&rft.au=Guyot,%20V.&rft.date=2007-09&rft.spage=1&rft.epage=4&rft.pages=1-4&rft.isbn=9781424410071&rft.isbn_list=142441007X&rft.isbn_list=1424410061&rft.isbn_list=9781424410064&rft_id=info:doi/10.1109/CANET.2007.4401682&rft_dat=%3Cieee_6IE%3E4401682%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-169f3a09230a688f3f108410239bcecaab1c2c7a97fe7c4ade064095074e636e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4401682&rfr_iscdi=true |