THE MOST ON DOCSITY
Find users

Types of Attacks-Wireless Networks-Lecture Slides

Slides, Wireless Networking

Post: August 7th, 2012
Description
This course consist on introduction to wireless communication, evolution of wireless communication systems, medium access techniques, propagation models, error control techniques, cellular systems, emerging networks. This lecture inlcudes: Types, Attacks, Passive, Active, Inject, Decrypt, Statistical, Analysis, Dictionary, Building
This course consist on introduction to wireless communication, evolution of wireless communication systems, medium access techniques, propagation models, error control techniques, cellular systems, emerging networks. This lecture inlcudes: Types, Attacks, Passive, Active, Inject, Decrypt, Statistical, Analysis, Dictionary, Building
-
Embed this document

Report Report

Reason:

Send Message

Login or register to download this document!

If you are already registered, login otherwise Register , it just takes 1 minute!

Uploaded by:

shaje_69kin...

shaje_69kinky
Universityuni_5documents_40doc_answ
Embed this document
Get the App
Contents
Outlines       Types of Attack Goals of 802.11 Security WEP Protocol WEP Authentication Security flaws in original 802.11 802.1x Security ► AKM Operations with AS ► AKM operations with PSK  IBSS Security model 2 docsity.com Last Lecture  Introduction ► What is Ad hoc networks? ► Characteristic (Heterogeneous, Self-creating, self-organizing, self-adminstrating, on-the-fly) ► Ad hoc vs. cellular networks ► Challenges (Spectrum allocation, Self-configuration, Medium access control (MAC), Energy efficiency, TCP Performance, Mobility management, Security & privacy, Routing protocols, Multicasting, QoS, Service Location, Provision, Access)  Routing Protocol ► Expected Properties of Ad-hoc Routing Protocols ► A taxonomy for routing protocols in Mobile ad ► Some common protocols (DSDV, AODV, DSR, ZRP, TORA) 3 docsity.com Types of Attacks  Passive attacks ► to decrypt traffic based on statistical analysis  Active attacks ► To injec..

Docsity.com

Learning becomes social!

Authentication required

This feature is reserved for registered user

Register Login

Docsity.com

Learning becomes social!

Authentication required

Hi!
In order to freely download all the documents on Docsity, please register or login:

Register Login