WEP, WPA e EAP
Rodrigo R. Paim
Referências
-
[1]
-
A. Lashkari, M. Danesh e B. Samadi.
A survey on wireless security protocols (WEP, WPA and
WPA2/802.11i).
International Conference on Computer Science and Information
Technology, pages 48-52, 2009.
- [2]
-
A. Lashkari, M. Mansoor e A. Danesh.
Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA).
International Conference on Signal Processing Systems, pages
445-449, 2009.
- [3]
-
A. Linhares e P. Gonçalves.
Uma Análise dos Mecanismos de Segurança de Redes IEEE 802.11:
WEP, WPA, WPA2 e IEEE 802.11w.
- [4]
-
A. Memon, A. Raza, S. Iqbal.
WLAN Security.
Master's thesis, 2010.
- [5]
-
A. Stubblefield, J. Ioannidis e A. Rubin.
A Key Recovery Attack on the 802.11b Wired Equivalent Privacy
Protocol (WEP).
ACM Transactions on Information and System Security, pages
319-332, 2004.
- [6]
-
B. Aboba, D. Simon e P. Eronen.
[RFC 5247] Extensible Authentication Protocol (EAP) Key Management
Framework, 2008.
- [7]
-
B. Aboba, J. Vollbrecht e J. Carlson.
[RFC 3748] Extensible Authentication Protocol (EAP), 2004.
- [8]
-
D. Halasz, W. Zorn, S. Norman, D. Smith.
[U.S. Patent 6996714] Wireless authentication protocol, 2006.
- [9]
-
D. Stanley, J. Walker e B. Aboba.
[RFC 4017] Extensible Authentication Protocol (EAP) Method
Requirements for Wireless LANs, 2005.
- [10]
-
G. Lehembre.
Wi-Fi security - WEP, WPA and WPA.
- [11]
-
H. Bulbul, I. Batmaz e M. Ozel.
Wireless Network Security : Comparison of WEP (Wired Equivalent
Privacy) Mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security
Network) Security Protocols.
- [12]
-
IEEE Standard for Information technology.
IEEE Standards: Part 11 Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) specifications - Amendment 6: Medium Access Control
(MAC) Security Enhancement, 2004.
- [13]
-
JANET - The UK's Educational and Research Network.
Extensible Authentication Protocol (EAP).
Factsheet.
- [14]
-
L. Han.
A Threat Analysis of The Extensible Authentication Protocol.
Technical report, Carleton University, 2006.
- [15]
-
L. Silva.
Segurança em Redes sem Fio (Wireless).
- [16]
-
R. Souza e F. Oliveira.
O padrão de criptografiaa simétrica AES.
- [17]
-
S. Fluhrer, I. Mantin e A. Shamir.
Weaknesses in the Key Scheduling Algorithm of RC4.
- [18]
-
S. Reddy, K. Ramani, K. Rijutha, S. Ali e C. H. Reddy.
Wireless hacking-a WiFi hack by cracking WEP.
In Proceedings of the 2nd International Conference on Education
Technology and Computer (ICETC '10), pages 1189-1193, 2010.
- [19]
-
S. Sotillo.
Extensible Authentication Protocol (EAP) Security Issues.
2008.
- [20]
-
W. Stallings.
Cryptography and Network Security: Principles and Practice,
chapter 17. Prentice Hall Press, 5th edition, 2010.