Security flaws in 802.11 data link protocols
نویسندگان
چکیده
منابع مشابه
A Salient Missing Link in RFID Security Protocols
In side channel analysis, an attacker utilizes some legitimate function queries in order to collect the corresponding responses of a cryptographic system while it is functioning in a normal mode. If those responses reveal some unwanted information about the secrecy or privacy, this leakage is called side channel information and these responses are called side channels. In this respect, careless...
متن کاملSecurity issues in link state routing protocols for MANETs
In link state routing networks, every node has to construct a topological map through the generation and exchange of routing information. Nevertheless, if a node misbehaves then the connectivity in the network is compromised. The proactive Optimized Link State Routing (OLSR) protocol has been designed exclusively for Mobile Ad Hoc Networks (MANETs). The core of the protocol is the selection of ...
متن کاملThe Missing Link: Human Interactive Security Protocols in Mobile Payment
A new family of protocols, based on communication over human-based side channels, permit secure pairing or group formation in ways that no party has to prove its name. These protocols are particularly suitable for authentication on mobile phones where PKI or trusted third party solutions are not practical to cover all scenarios. Rather, individuals are able to hook up devices in their possessio...
متن کاملSecurity Flaws in the Hotjava Web Browser
The growth of the Internet and the World Wide Web has led to demand for Web extensions, such as the ability to run server-supplied code on a Web client. We examine the HotJava Web browser and the Java language in which it is implemented. We demonstrate several attacks that compromise HotJava's security. Some of these attacks are made possible through browser code that fails to enforce access pe...
متن کاملHomeland Security Data Mining and Link Analysis
Data mining is the process of posing queries to large quantities of data and extracting information often previously unknown using mathematical, statistical, and machine-learning techniques. Data mining has many applications in a number of areas, including marketing and sales, medicine, law, manufacturing, and, more recently, homeland security. Using data mining, one can uncover hidden dependen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications of the ACM
سال: 2003
ISSN: 0001-0782,1557-7317
DOI: 10.1145/769800.769823