分析修改后的WPA的行为

Kashish Monga, V. Arora, Ashish Kumar
{"title":"分析修改后的WPA的行为","authors":"Kashish Monga, V. Arora, Ashish Kumar","doi":"10.1109/ICCN.2015.11","DOIUrl":null,"url":null,"abstract":"With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Analyzing the behavior of WPA with modification\",\"authors\":\"Kashish Monga, V. Arora, Ashish Kumar\",\"doi\":\"10.1109/ICCN.2015.11\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.\",\"PeriodicalId\":431743,\"journal\":{\"name\":\"2015 International Conference on Communication Networks (ICCN)\",\"volume\":\"84 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Communication Networks (ICCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCN.2015.11\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Communication Networks (ICCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCN.2015.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

随着科技的进步,信息和通信的价值已经显现出来。快速可靠的通信是这一代人所需要的。信息和快速沟通已成为成功的关键。随着人们对技术和软数据的依赖越来越多,网络或系统的破坏也越来越多。人们可以很容易地使用防病毒或反恶意软件来保护系统,但网络呢?为此,Wi-Fi联盟定义了一些协议,通常被称为WEP, WPA WPA2,在本文中,我们将修改WPA,使其更可靠,使用SHA3作为加密散列算法,以保证数据的安全性和完整性。稍后我们将分析结果,并将其与类似条件下使用的SHA1进行比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analyzing the behavior of WPA with modification
With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信