Robust and Low Latency Security Framework for IEEE 802.11 Wireless Networks / (Record no. 181208)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01615 a2200181 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | Nust |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20260117140309.0 |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | Nust |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8,JUN |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Junaid, Muhammad |
| 9 (RLIN) | 132784 |
| 245 ## - TITLE STATEMENT | |
| Title | Robust and Low Latency Security Framework for IEEE 802.11 Wireless Networks / |
| Statement of responsibility, etc. | Muhammad Junaid |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Name of publisher, distributor, etc. | MCS (NUST) |
| Date of publication, distribution, etc. | Sep 2009 |
| Place of publication, distribution, etc. | Rawalpindi |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xi, 106 p. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Wireless Networks call for enhanced confidentiality, integrity and authentication services because of their inhernet weakness. ' Counter Mode Cipher Block Chaining Message Authentication Code Protocol' (CCMP) has recently been employed to replace flawed ' Wired Equivalent Privacy ' area networks (WLAN). Meanwhile, IEEE 802.11s - Draft standard for wireless mesh networks (WMN) - has also propsed to use CCMP. CCMP, a two pass process, introduces considerable latency in multi-hop wireless networks susch as WMN. This research exposes the vulnerability of CCMP against precomputation time memory trade-off (TMTO) attack and proposes a framework to strengthen the security of WLAN packets using Per packet security mechanism. Furthermore, a novel robust and low latency framework for WMN is also proposed. The architecture of security framework involes introduction of piggyback challenge response protocol for provideing data confidentiality and data integrity. Piggyback challenge response protocol offers fresh encryption key for every packet, per-packet authentication and use of secreat nonce. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | PhD Information Security Thesis |
| 9 (RLIN) | 132793 |
| 651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME | |
| Geographic name | PhD IS Thesis |
| 9 (RLIN) | 132794 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Thesis |
| Source of classification or shelving scheme | |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Date acquired | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Public note |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Military College of Signals (MCS) | Military College of Signals (MCS) | Thesis | 12/12/2016 | 005.8,JUN | MCSPhD IS-01 | 12/08/2016 | 12/12/2016 | Thesis | Almirah No.68, Shelf No.5 |
