WLAN Security Access Protocol for Rapid Initial Link Setup Process

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Selecting transition process for WLAN security

In wireless local area network (WLAN), a station (STA) accesses the Internet through an access point (AP). When switching from one AP to another, the STA executes the transition process, which may incur long delay and result in force-termination for real-time applications. The IEEE 802.11r proposes the fast basic service set (BSS) transition to speed up the transition process for a STA moving w...

متن کامل

Modified user-dependent perfect-scheduling multiple access protocol for WLAN

Based on effective contention access and perfect scheduling transmission, an enhanced multiple access protocol – UPMA++ protocol – is proposed. It allocates the resource dynamically according to the actual traffic requirement and does not require the synchronisation in the whole network. This protocol adjusts the length of contention access period and polling period effectively to resolve the c...

متن کامل

Optimization of IrDA IrLAP link access protocol

The widespread installation of millions of Infrared Data Association (IrDA) infrared (IR) ports in mobile devices for wireless communication applications necessitates for throughput performance optimization of the IR links at the IrDA link access protocol (IrLAP) link layer. For IrDA connectivity, link-layer throughput optimization is important for any line bit-error rate (BER). The paper provi...

متن کامل

IEEE 802.11i WLAN Security Protocol – A Software Engineer’s Model

Wireless local area networks (WLANs) based on the IEEE 802.11 standards are one of today’s fastest growing technologies in businesses, schools, and homes, for good reasons. As WLAN deployments increase, so does the challenge to provide these networks with security. Security risks can originate either due to technical lapse in the security mechanisms or due to defects in software implementations...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology

سال: 2015

ISSN: 1598-3986

DOI: 10.13089/jkiisc.2015.25.6.1515