分析修改后的WPA的行为

Kashish Monga, V. Arora, Ashish Kumar
{"title":"分析修改后的WPA的行为","authors":"Kashish Monga, V. Arora, Ashish Kumar","doi":"10.1109/ICCN.2015.11","DOIUrl":null,"url":null,"abstract":"With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Analyzing the behavior of WPA with modification\",\"authors\":\"Kashish Monga, V. Arora, Ashish Kumar\",\"doi\":\"10.1109/ICCN.2015.11\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.\",\"PeriodicalId\":431743,\"journal\":{\"name\":\"2015 International Conference on Communication Networks (ICCN)\",\"volume\":\"84 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Communication Networks (ICCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCN.2015.11\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Communication Networks (ICCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCN.2015.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

随着科技的进步,信息和通信的价值已经显现出来。快速可靠的通信是这一代人所需要的。信息和快速沟通已成为成功的关键。随着人们对技术和软数据的依赖越来越多,网络或系统的破坏也越来越多。人们可以很容易地使用防病毒或反恶意软件来保护系统,但网络呢?为此,Wi-Fi联盟定义了一些协议,通常被称为WEP, WPA WPA2,在本文中,我们将修改WPA,使其更可靠,使用SHA3作为加密散列算法,以保证数据的安全性和完整性。稍后我们将分析结果,并将其与类似条件下使用的SHA1进行比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Analyzing the behavior of WPA with modification
With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Ontology based intrusion detection system for web application security High datarate rate regulated 4D 8PSK-TCM implementation in FPGA for satellite The Cloud-interactive knowledge Parking intervention model Multiresonator based system for performance evaluation utilizing high gain and reducing error The alleviation of low power Schmitt trigger using FinFET technology
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1