1 |
IEEE Standard 802.11, "Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications," IEEE, IEEE Std 802.11(Revision of IEEE std 802.11-1999), June 2007
|
2 |
F.D. Rango, D.C. Lentini, and S. Marano, "Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i," EURASIP Journal on Wireless Communications and Networking, vol. 2006, no.2, pp. 1–19, Apr. 2006
DOI
|
3 |
C. He and J.C. Mitchell, "Security analysis and improvements for IEEE802.11i," Proceedings of the 12th Annual Network and Distributed System Security Symposium(NDSS '05), Denial of Service Attacks, Feb. 2005
|
4 |
A. Mishra, M.H. Shin, N. Petroni, T.C. Clancy, and W.A. Arbaugh, “Proactive key distribution using neighbor graphs,” IEEE Wireless Communications, vol. 11, no. 1, pp. 26-36, Feb. 2004
DOI
ScienceOn
|
5 |
IEEE 802.11r Draft Standard, "Draft Standard for Information technology - Telecommunications and information exchange between system - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications - Amendment 2: Fast BSS Transition," IEEE, Sep. 2007
|
6 |
IEEE Standard 802.1x, "IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control," IEEE, IEEE Std 802.1X-2004(Revision of IEEE Std 802.1X-2001), June 2001
|
7 |
IEEE Standard 802.11i, "Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications," IEEE, July 2004
|
8 |
C. He and C. Mitchell, "Analysis of the 802.11i 4-way handshake," Proceedings of the 3rd ACM workshop on Wireless security(WiSe'04), pp. 43-50, Oct. 2004
DOI
|
9 |
IEEE Standard 802.11f, "IEEE Trial-Use Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter- Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation," IEEE, July 2003
|