Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach

Journal Title: International Research Journal of Computer Science - Year 2017, Vol 0, Issue 0

Abstract

This paper analysis vulnerability of known attacks on WLAN cipher suite, authentication mechanisms and credentials using common vulnerability scoring system (CVSS).

Authors and Affiliations

David Gitonga Mwathi, William Okelo-Odongo, Elisha Opiyo

Keywords

Related Articles

A Novel Approach for Cryptography using Modified Substitution Cipher and Triangulation

In this paper a novel approach to encryption and decryption is presented, which will include two new techniques, namely, Rounded Cipher, a modified version of the substitution cipher, and Triangulation. This approach als...

Cloud Pricing - A Concern in Cloud Computing

Cloud computing is emerging as a promising field offering a variety of computing services to end users. These services are offered at different prices using various pricing schemes and techniques. End users will favor th...

A MECHANISM FOR PREVENTING DUPLICATE FILES IN CLOUD

cloud computing provides a way of storing a voluminous data and can be easily accessed anywhere. This work deals about the prevention of a duplicate file storage in cloud. Here there are three important components in our...

Angular Paging in Distance-based Location Registration in Mobile Communication

In this study, we proposed a new paging method, angular paging, that reduces the paging cost in distance based location registration (DBR). DBR causes a mobile station (MS) to register its location when the distance betw...

Exploring Regression Techniques for Predictions of Wheat and Rice Prices in India

Agriculture products play an important role in the economy of the country. In India, Wheat and Rice are the two major agriculture products and lots of economical decisions are taken by considering the prices of these agr...

Download PDF file
  • EP ID EP183710
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

David Gitonga Mwathi, William Okelo-Odongo, Elisha Opiyo (2017). Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach. International Research Journal of Computer Science, 0(0), 16-23. https://europub.co.uk/articles/-A-183710