Academic literature on the topic 'Wi-Fi Protected Access 3'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wi-Fi Protected Access 3.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wi-Fi Protected Access 3"

1

Lee, Byoungcheon. "Stateless Re-Association in WPA3 Using Paired Token." Electronics 10, no. 2 (January 19, 2021): 215. http://dx.doi.org/10.3390/electronics10020215.

Full text
Abstract:
In Wi-Fi Protected Access 3 (WPA3), a secure connection is established in two sequential stages. Firstly, in the authentication and association stage, a pairwise master key (PMK) is generated. Secondly, in the post-association stage, a pairwise transient key (PTK) is generated from PMK using the traditional 4-way handshake protocol. To reduce the heavy load of the first stage, PMK caching can be used. If the client and AP are previously authenticated and have a PMK cache, the first heavy stage can be skipped and the cached PMK can be used to directly execute the 4-way handshake. However, PMK caching is a very primitive technology to manage shared key between a client and AP and there are many limitations; AP has to manage a stateful cache for a large number of clients, cache lifetime is limited, etc. Paired token (PT)is a new secondary credential scheme that provides stateless pre-shared key (PSK) in a client-server environment. The server issues a paired token (public token and secret token) to an authenticated client where the public token has the role of signed identity and the secret token is a kind of shared secret. Once a client is equipped with PT, it can be used for many symmetric key-based cryptographic applications such as authentication, authorization, key establishment, etc. In this paper, we apply the PT approach to WPA3 and try to replace the PMK caching with the one-time authenticated key establishment using PT. At the end of a successful full handshake, AP securely issues PT to the client. Then, in subsequent re-association requests, the client and AP can compute the same one-time authenticated PMK using PT in a stateless way. Using this kind of stateless re-association technology, AP can provide a high performance Wi-Fi service to a larger number of clients.
APA, Harvard, Vancouver, ISO, and other styles
2

Eissa, M. M., Ihab A. Ali, and K. M. Abdel-Latif. "Wi-Fi protected access for secure power network protection scheme." International Journal of Electrical Power & Energy Systems 46 (March 2013): 414–24. http://dx.doi.org/10.1016/j.ijepes.2012.10.034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Chin-Ling, and Supaporn Punya. "An enhanced WPA2/PSK for preventing authentication cracking." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 2 (August 1, 2021): 85. http://dx.doi.org/10.11591/ijict.v10i2.pp85-92.

Full text
Abstract:
Wi-Fi Protected Access 2 (WPA 2) currently is the most widely used mechanism for protecting the users in wireless networks. We have discussed the weakness of 4-way handshake procedure in Wi-Fi WPA2/PSK and proposed an enhance WPA2/PSK by adding timestamp parameter to prevent authentication cracking. The experiments have compared WPA2/PSK with Enhanced WPA2/PSK cracking and the result is also given.
APA, Harvard, Vancouver, ISO, and other styles
4

Nguyen, Duc-Thang, and Taehong Kim. "An SDN-Based Connectivity Control System for Wi-Fi Devices." Wireless Communications and Mobile Computing 2018 (July 24, 2018): 1–10. http://dx.doi.org/10.1155/2018/9359878.

Full text
Abstract:
In recent years, the prevalence of Wi-Fi-enabled devices such as smartphones, smart appliances, and various sensors has increased. As most IoT devices lack a display or a keypad owing to their tiny size, it is difficult to set connectivity information such as service set identifier (SSID) and password without any help from external devices such as smartphones. Moreover, it is much more complex to apply advanced connectivity options such as SSID hiding, MAC ID filtering, and Wi-Fi Protected Access (WPA) to these devices. Thus, we need a new Wi-Fi network management system which not only facilitates client access operations but also provides a high-level authentication procedure. In this paper, we introduce a remote connectivity control system for Wi-Fi devices based on software-defined networking (SDN) in a wireless environment. The main contributions of the proposed system are twofold: (i) it enables network owner/administrator to manage and approve connection request from Wi-Fi devices through remote services, which is essential for easy connection management across diverse IoT devices; (ii) it also allows fine-grained access control at the device level through remote control. We describe the architecture of SDN-based remote connectivity control of Wi-Fi devices. While verifying the feasibility and performance of the proposed system, we discuss how the proposed system can benefit both service providers and users.
APA, Harvard, Vancouver, ISO, and other styles
5

Kalniņš, Rūdolfs, Jānis Puriņš, and Gundars Alksnis. "Security Evaluation of Wireless Network Access Points." Applied Computer Systems 21, no. 1 (May 24, 2017): 38–45. http://dx.doi.org/10.1515/acss-2017-0005.

Full text
Abstract:
Abstract The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Omollo, Vincent N., and Ruth K. Chweya. "Practical Attack on Wi-Fi Protected Access Version 2 Authentication Protocol." Universal Journal of Communications and Network 3, no. 2 (May 2015): 35–40. http://dx.doi.org/10.13189/ujcn.2015.030201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Garey, Wesley D., Yishen Sun, and Richard A. Rouil. "Performance Evaluation of Proximity Services and Wi-Fi for Public Safety Mission Critical Voice Application." Wireless Communications and Mobile Computing 2020 (May 21, 2020): 1–12. http://dx.doi.org/10.1155/2020/8198767.

Full text
Abstract:
Proximity Services (ProSe) and Wi-Fi are two promising technologies that may provide support for Mission Critical Voice (MCV) applications in remote and rural areas by enabling Device-to-Device (D2D) communication. In this paper, several performance metrics of ProSe and Wi-Fi are evaluated and compared side-by-side under various configurations. The ns-3 simulation results show that ProSe outperforms Wi-Fi in terms of coverage range and access time with a medium traffic load, while Wi-Fi has a shorter access time under a light traffic load. In addition, with various user densities, ProSe offers better coverage range and access time a majority of the time. The evaluation in this paper provides insights to first responders on what to expect with either technology and how to improve the performance by adjusting different system parameters.
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, Yue, Ruizhi Chen, Zuoya Liu, Guangyi Guo, Feng Ye, and Liang Chen. "Wi-Fi Fine Time Measurement: Data Analysis and Processing for Indoor Localisation." Journal of Navigation 73, no. 5 (May 4, 2020): 1106–28. http://dx.doi.org/10.1017/s0373463320000193.

Full text
Abstract:
Indoor positioning systems have received increasing attention for supporting location-based services in indoor environments. Wi-Fi based indoor localisation has become attractive due to its extensive distribution and low cost properties. IEEE 802.11-2016 now includes a Wi-Fi Fine Time Measurement (FTM) protocol which can be used for Wi-Fi ranging between intelligent terminal and Wi-Fi access point. This paper introduces a framework of Wi-Fi FTM data acquisition and processing that can be used for indoor localisation. We analyse the main factors that affect the accuracy of Wi-Fi ranging and propose a calibration, filtering and modelling algorithm that can effectively reduce the ranging error caused by clock deviation, non-line-of-sight (NLOS) and multipath propagation. Experimental results show that the proposed calibration and filtering method is able to achieve metre-level ranging accuracy in case of line-of-sight by using large bandwidth. Estimation results also show that the proposed Wi-Fi ranging model provides an accurate ranging performance in NLOS and multipath contained indoor environment; the final positioning error is less than 2·2 m with a stable output frequency of 3 Hz.
APA, Harvard, Vancouver, ISO, and other styles
9

Noh, Jaewon, Jeehyeong Kim, and Sunghyun Cho. "Secure Authentication and Four-Way Handshake Scheme for Protected Individual Communication in Public Wi-Fi Networks." IEEE Access 6 (2018): 16539–48. http://dx.doi.org/10.1109/access.2018.2809614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Reva, Ivan, Aleksei Bogdanov, and Ekaterina Malakhova. "Application of Wi-Fi-access points to record object movements." Science Bulletin of the Novosibirsk State Technical University, no. 3 (October 9, 2017): 104–25. http://dx.doi.org/10.17212/1814-1196-2017-3-104-125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Wi-Fi Protected Access 3"

1

Mironov, Georgiana. "Challenges of Wireless Security in the Healthcare Field : A study on the WPA3 standard." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99780.

Full text
Abstract:
The healthcare environment is a complex one, saturated by wireless medical devices and sensitive patient data flowing through the network traffic. With the increased popularity of wireless medical devices in the healthcare domain together with the announcement of the new wireless security standard WPA3 comes a need to prepare for a new generation shift in wireless security. The goal of this study is therefore to investigate what challenges the healthcare sector can encounter when faced with the inevitable transition to WPA3. By performing a literature review on the security state of WPA3 compared to its predecessor and performing qualitative interviews with network technicians working in the healthcare sector, three major challenges were identified. IT professionals in the healthcare domain struggle with integrating legacy software systems, keeping middleware software solutions secure, and with handling hardware medical devices that come with outdated wireless standards. By analysing existing literature, several mitigating actions to battle these challenges were presented in this study.
APA, Harvard, Vancouver, ISO, and other styles
2

Wen-Chang, Tsai, and 蔡文章. "Robust WLAN Encryption Design with Wi-Fi Protected Access." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/13161947873617227081.

Full text
Abstract:
碩士
淡江大學
電機工程學系碩士在職專班
92
WLAN definitely originated from Wi-Fi League, as one of the outstanding NPO (Non Profitable Organization) in the world. WPA (Wi-Fi Protected Access) as a solution from cognizant hacking is prior to IEEE802.11i and effective to improve the security of WLAN products. The early WLAN encryption by the way of WEP (Wired Equivalent Privacy), unfortunately, this is a solution ineffectively from skilled hackers. In the other words, hackers can pick up the intended information and analyze to have the key against appropriate equipment and software. TKIP (Temporal Key Integrity Protocol) under WPA construct is a reinforced technology from WEP, which applies Mixing Function for WEP Seed through Temporal Key and TSC. As a result, TKIP reconstructs WLAN security as firm as possible. This essay is to corroborate the effectiveness for WPA encrypting on IEEE 802.11i environment. This Paper, under IEEE802.11i environment, is encrypting through WPA. Under IEEE802.11i skeleton, identity authentication is containing with EAP (defined as RFC2284), 802.1X and RADIUS (defined as RFC2138 and RFC2548), and so on. However, WPA is belong to Privacy authentication, which is to improve the WEP security. Foe example, WPA applies source/destination IP and Priority, through specific algorithm and attached behind data, as basic encryption data. The reason is to verify the data accuracy and amplify the security. In addition to TKIP technology, WEP security is greatly improved.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Wi-Fi Protected Access 3"

1

A, Arbaugh William, ed. Real 802.11 security: Wi-Fi protected access and 802.11i. Boston, MA: Addison-Wesley, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Edney, Jon, and William A. Arbaugh. Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley Professional, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Wi-Fi Protected Access 3"

1

Zhong, Sheng. "Wi-Fi Protected Access (WPA)." In Encyclopedia of Wireless Networks, 1461–63. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhong, Sheng. "Wi-Fi Protected Access (WPA)." In Encyclopedia of Wireless Networks, 1–3. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32903-1_175-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Szott, Szymon, Marek Sikora, Marek Natkaniec, and Krzysztof Loziak. "Detecting Transmission Power Misbehaviour in Wi-Fi Networks." In Wireless Access Flexibility, 58–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39805-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sukhija, Swati, and Shilpi Gupta. "Trusted Computing Architecture for Wi-Fi Protected Access 2 (WPA2) Optimization." In Lecture Notes in Electrical Engineering, 391–97. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-3363-7_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khorov, Evgeny, Artem Krasilov, Andrey Lyakhov, and Dmitry Ostrovsky. "Dynamic Resource Allocation for MCCA-Based Streaming in Wi-Fi Mesh Networks." In Wireless Access Flexibility, 93–111. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39805-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xia, Haidong, and José Brustoloni. "Detecting and Blocking Unauthorized Access in Wi-Fi Networks." In Lecture Notes in Computer Science, 795–806. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24693-0_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ho, Quang-Dung, Daniel Tweed, and Tho Le-Ngoc. "IEEE 802.11/Wi-Fi Medium Access Control: An Overview." In SpringerBriefs in Electrical and Computer Engineering, 31–41. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47346-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sivaraj, Rajarajan, and Prasant Mohapatra. "Future Radio Access, Wi-Fi-LTE, LTE-Advanced: The Path to 5G." In Optical Networks, 3–41. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-42822-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Chunlei, Qian Wu, Hewu Li, and Jun Liu. "Trustroam: A Novel Blockchain-Based Cross-Domain Authentication Scheme for Wi-Fi Access." In Wireless Algorithms, Systems, and Applications, 149–61. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23597-0_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Budde, Matthias, Till Riedel, Marcel Köpke, Matthias Berning, and Michael Beigl. "A Comparative Study to Evaluate the Usability of Context-Based Wi-Fi Access Mechanisms." In Universal Access in Human-Computer Interaction. Aging and Assistive Environments, 451–62. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07446-7_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wi-Fi Protected Access 3"

1

Lashkari, Arash Habibi, Masood Mansoor, and Amir Seyed Danesh. "Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)." In 2009 International Conference on Signal Processing Systems. IEEE, 2009. http://dx.doi.org/10.1109/icsps.2009.87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abd Razak, Mohd Raziff, Tengku Azita Tengku Aziz, and Noormazatul Elena Abdul Ghani. "The performance of wi-fi protected access 2 on 2.4GHz WLAN network." In 2017 International Conference on Engineering Technology and Technopreneurship (ICE2T). IEEE, 2017. http://dx.doi.org/10.1109/ice2t.2017.8215953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Tanesh, Bishwajeet Pandey, Teerath Das, and D. M. Akbar Hussain. "I/O standard based thermal/energy efficient green communication for Wi-Fi protected access on FPGA." In 2014 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2014. http://dx.doi.org/10.1109/icumt.2014.7002085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Holstein, Dennis. "Wi-Fi Protected Access for Protection and Automation a work in progress by CIGRE Working Group B5.22." In 2006 IEEE PES Power Systems Conference and Exposition. IEEE, 2006. http://dx.doi.org/10.1109/psce.2006.296234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

BULBUL, Halil Ibrahim, Ihsan BATMAZ, and Mesut OZEL. "Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols." In 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia. ACM, 2008. http://dx.doi.org/10.4108/e-forensics.2008.2654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography