{"title":"基于wep的IEEE 802.11无线传感器网络安全管理","authors":"Vincent Guyot","doi":"10.1109/CANET.2007.4401682","DOIUrl":null,"url":null,"abstract":"With the normalization of the 802.11 standard and the emergence of Wi-Fi low-cost devices, some sensor network testbeds use this wireless technology. WEP, the protocol handling 802.11 security, is finally a flawed protocol. The TKIP protocol has been standardized to solve these security problems in infrastructure environments with access points. Unfortunately, 802.11 sensor networks remain unsafe. To solve this security problem in sensor networks, we use smart cards to handle the actual WEP-based 802.11 networking adapters.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"WEP-based security management in IEEE 802.11 wireless sensor networks\",\"authors\":\"Vincent Guyot\",\"doi\":\"10.1109/CANET.2007.4401682\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the normalization of the 802.11 standard and the emergence of Wi-Fi low-cost devices, some sensor network testbeds use this wireless technology. WEP, the protocol handling 802.11 security, is finally a flawed protocol. The TKIP protocol has been standardized to solve these security problems in infrastructure environments with access points. Unfortunately, 802.11 sensor networks remain unsafe. To solve this security problem in sensor networks, we use smart cards to handle the actual WEP-based 802.11 networking adapters.\",\"PeriodicalId\":413993,\"journal\":{\"name\":\"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CANET.2007.4401682\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CANET.2007.4401682","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
WEP-based security management in IEEE 802.11 wireless sensor networks
With the normalization of the 802.11 standard and the emergence of Wi-Fi low-cost devices, some sensor network testbeds use this wireless technology. WEP, the protocol handling 802.11 security, is finally a flawed protocol. The TKIP protocol has been standardized to solve these security problems in infrastructure environments with access points. Unfortunately, 802.11 sensor networks remain unsafe. To solve this security problem in sensor networks, we use smart cards to handle the actual WEP-based 802.11 networking adapters.