Yi Yuan - Academia.edu (original) (raw)

Address: Williamsburg, Virginia, United States

less

Related Authors

Iasir Journals

Ifeyinwa A Ajah

Raj Jain

Raj Jain

Washington University in St. Louis

sachin tc

Visvesvaraya Technological University

Ahmad Alrasd

生德 祁

Northwestern University

Moffat Mathews

Profesor Madya Dr. Rosli Bin Saleh

Phivos Mylonas

Phivos Mylonas

University of West Attica / Πανεπιστήμιο Δυτικής Αττικής

Uploads

Papers by Yi Yuan

Research paper thumbnail of A Survey of Wireless Security

Constant increase in use of wireless infrastructure networks for business purposes created a need... more Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. The paper also gives a summary of security improvements of WEP protocol that can lead to a higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparsion to the previous security solutions.

Research paper thumbnail of A Survey of Wireless Security

Constant increase in use of wireless infrastructure networks for business purposes created a need... more Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. The paper also gives a summary of security improvements of WEP protocol that can lead to a higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparsion to the previous security solutions.

Log In