Author:
Diwakar Manoj,Singh Prabhishek,Kumar Pramod,Tiwari Kartikay,Bhushan Shashi
Reference29 articles.
1. Khan MA, Hasan A (2008) Pseudo random number based authentication to counter denial of service attacks on 802.11. In: 5th IFIP international conference on wireless and optical communications networks, WOCN ‘08, pp 1–5
2. Yao Y, Chong J, Xingwei W (2010) Enhancing RC4 algorithm for WLAN WEP protocol. In: The control and decision conference (CCDC), pp 3623–3627
3. Chen J-C, Wang Y-P (2005) Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience. IEEE Commun Mag 43:supl.26–supl.32
4. Gast M (2005) 802.11 wireless networks: the definitive guide. O’Reilly Publication
5. Mohapatra H, Rath S, Panda S, Kumar R (2020) Handling of man-in-the-middle attack in wsn through intrusion detection system. Int J 8(5):1503–1510
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献