{"title":"分析修改后的WPA的行为","authors":"Kashish Monga, V. Arora, Ashish Kumar","doi":"10.1109/ICCN.2015.11","DOIUrl":null,"url":null,"abstract":"With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Analyzing the behavior of WPA with modification\",\"authors\":\"Kashish Monga, V. Arora, Ashish Kumar\",\"doi\":\"10.1109/ICCN.2015.11\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.\",\"PeriodicalId\":431743,\"journal\":{\"name\":\"2015 International Conference on Communication Networks (ICCN)\",\"volume\":\"84 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Communication Networks (ICCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCN.2015.11\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Communication Networks (ICCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCN.2015.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With the advancement of technology, the value of information and communication has emerged. Fast and reliable communication are what this generation demands. Information and speedy communication have become key to success. As maximum of the people now-a-days relying on the technology and soft data there has been increase in the breach of the network or system. One can easily use antivirus or antimalware software for system protection but what about Network. For this some protocol has been defined by Wi-Fi alliance popularly named as WEP, WPA WPA2, Here in this paper we are going modify WPA to make it more reliable using SHA3 as a cryptographic hashing algorithm for both security and integrity of the data. We will analyze the results later on and compare it with SHA1 used under similar conditions.