Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach

Journal Title: International Research Journal of Computer Science - Year 2017, Vol 0, Issue 0

Abstract

This paper analysis vulnerability of known attacks on WLAN cipher suite, authentication mechanisms and credentials using common vulnerability scoring system (CVSS).

Authors and Affiliations

David Gitonga Mwathi, William Okelo-Odongo, Elisha Opiyo

Keywords

Related Articles

Block Based Algorithms for Estimating Motion

In this paper we are discussing about ME in video compression that to specifically about the algorithms used for it. Here we can see the different types of BMA which are implemented and compared, which includes from some...

Design and Implementation of Lecturer Evaluation System Using ELECTRE Method in Web-based Application

In order to improve the performance of human resources (in this case is a lecturer) at the Faculty of Computer Science University of Mercu has conducted a lecturer's performance evaluation at the end of each semesterBuan...

ANALYSIS ON THE QUALITY OF THREE-PHASE TRANSFORMER OIL

Tangent delta is an electrical diagnostic method to determine the condition of the insulation. One of the insulation to know is transformer oil being a liquid insulation. In a transformer, insulation is an important part...

A MECHANISM FOR PREVENTING DUPLICATE FILES IN CLOUD

cloud computing provides a way of storing a voluminous data and can be easily accessed anywhere. This work deals about the prevention of a duplicate file storage in cloud. Here there are three important components in our...

The False Positive Alert Reduction Using Data mining Techniques in Intrusion Detection System

Information security is a vital aspect of any organization. Most of the organizations relay and trust on the intrusion Detection System (IDS) which play important role in detecting intrusions in data network environment....

Download PDF file
  • EP ID EP183710
  • DOI -
  • Views 121
  • Downloads 0

How To Cite

David Gitonga Mwathi, William Okelo-Odongo, Elisha Opiyo (2017). Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach. International Research Journal of Computer Science, 0(0), 16-23. https://europub.co.uk/articles/-A-183710