Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach

Journal Title: International Research Journal of Computer Science - Year 2017, Vol 0, Issue 0

Abstract

This paper analysis vulnerability of known attacks on WLAN cipher suite, authentication mechanisms and credentials using common vulnerability scoring system (CVSS).

Authors and Affiliations

David Gitonga Mwathi, William Okelo-Odongo, Elisha Opiyo

Keywords

Related Articles

Sensible Mouse using Sixth Sense Technology

The main aim of Sixth Sense Technology has always been the to reduce the distance between our physical world and digital world. This has been done in numerous ways. The purpose of this paper is to present one such ways o...

Relation Extraction Based on Pattern Learning Approach

semantically, objects in unstructured document are related each other to perform a certain entity relation. This certain entity relation such: drug-drug interaction through their compounds, buyer-seller relationship thro...

Network Routing Problem in Multigraph

This paper tries to find an easy method for solving the problem of routing in computer network where the network is using multigraph. This is done mainly using comparison of weight or cost of various multi arcs between a...

Utilization of GPS Technology to Control Regional Development Project with the Efficient Use of Energy Consumption - Based Smartphone

GPS (Global Positioning System) has a variety of applications among which real-time tracking finds significance in day-to-day life. One of the technologies used to find locations by GPS (global positioning system). Servi...

A Study of Intrusion Detection System using Advanced Genetic Algorithm

As of today, we are relying more and more on Internet or network computer access, a growing problem intrusion into computer systems by unauthorized users has been observed. An intrusion is unauthorized access or attempte...

Download PDF file
  • EP ID EP183710
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

David Gitonga Mwathi, William Okelo-Odongo, Elisha Opiyo (2017). Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach. International Research Journal of Computer Science, 0(0), 16-23. https://europub.co.uk/articles/-A-183710