1. Wi-Fi Alliance. Accessed November 2021. Discover Wi-Fi Security. https://www.wi-fi.org/discover-wi-fi/security. Wi-Fi Alliance. Accessed November 2021. Discover Wi-Fi Security. https://www.wi-fi.org/discover-wi-fi/security.
2. Xuewei Feng , Qi Li , Kun Sun , Yuxiang Yang , and Ke Xu . 2022 . Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects . In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 694–709 . Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, and Ke Xu. 2022. Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 694–709.
3. Weaknesses in the Key Scheduling Algorithm of RC4
4. Thomas Narten Erik Nordmark William Allen Simpson and Hesham Soliman. 2007. Neighbor Discovery for IP version 6 (IPv6). RFC 4861. Internet Engineering Task Force. 1–97 pages. Thomas Narten Erik Nordmark William Allen Simpson and Hesham Soliman. 2007. Neighbor Discovery for IP version 6 (IPv6). RFC 4861. Internet Engineering Task Force. 1–97 pages.
5. Jon Postel. 1981. Internet Control Message Protocol. RFC 792. Internet Engineering Task Force. 1–21 pages. http://www.rfc-editor.org/rfc/rfc792.txt Jon Postel. 1981. Internet Control Message Protocol. RFC 792. Internet Engineering Task Force. 1–21 pages. http://www.rfc-editor.org/rfc/rfc792.txt