{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:16:06Z","timestamp":1759331766937},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_44","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"496-511","source":"Crossref","is-referenced-by-count":16,"title":["A Survey on Wi-Fi Protocols: WPA and WPA2"],"prefix":"10.1007","author":[{"given":"Mahmoud","family":"Khasawneh","sequence":"first","affiliation":[]},{"given":"Izadeen","family":"Kajman","sequence":"additional","affiliation":[]},{"given":"Rashed","family":"Alkhudaidy","sequence":"additional","affiliation":[]},{"given":"Anwar","family":"Althubyani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Mylonas, P., Mavridis, I.P., Androulakis, A.-I.E., Halkias, A.B.: Real-life paradigms of wireless network security attacks (2011)","DOI":"10.1109\/PCI.2011.25"},{"key":"44_CR2","unstructured":"Sukhija, S., Gupta, S.: Wireless Network Security Protocols A Comparative Study (January 2012)"},{"key":"44_CR3","unstructured":"Lehembre, G.: Wi-Fi security \u2013 WEP, WPA and WPA2 (June 2005)"},{"key":"44_CR4","unstructured":"Mathews, M., Hunt, R.: Evolution of Wireless LAN Security Architecture to IEEE 802.11i (WPA2). In: Proceedings of the fourth IASTED Asian Conference on Communication Systems and Networks (2007)"},{"key":"44_CR5","unstructured":"Lehembre, G.: \u2015Wi-Fi security \u2013WEP, WPA and WPA2\u2016, Article published in number 1\/2006 (14) of hakin9 (January 2006), Publication on, \n                    \n                      www.hsc.fr"},{"key":"44_CR6","unstructured":"Turab, N., Masadeh, S.: \u2015Recommendations guide for WLAN Security. The International Journal of ACM\u00a01(1) (March 2010)"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Park, S.H., Ganz, A., Ganz, Z.: \u2015Security protocol for IEEE 802.11 wireless local area network. Mobile Networks and Applications\u00a03 (1998)","DOI":"10.1023\/A:1019180916909"},{"key":"44_CR8","unstructured":"Katz, F.H.: \u2015WPA vs. WPA2: Is WPA2 Really an Improvement on WPA? In: 2010 4th Annual Computer Security Conference (CSC 2010), Coastal Carolina University, Myrtle Beach, SC, April 15-16 (2010)"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Frankel, S., Eydt, B., Owens, L., Scarfone, K.: Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i, NIST Special Publication 800-97, National Institute of Standards and Technology (2007)","DOI":"10.6028\/NIST.SP.800-97"},{"key":"44_CR10","unstructured":"Lashkari, A.H., Danesh, M.M.S., Samadi, B.: FCSIT. A survey on wireless security protocols (WEP, WPA and WPA2\/802.11i). In: 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT (2009)"},{"key":"44_CR11","unstructured":"Benton, K.: \u2015The evolution of 802.11 wireless security\u2016, INF 795. UNLV Informatics-Spring (April 18, 2010)"},{"key":"44_CR12","unstructured":"Beck, M., Tews, E.: \u2015Practical attacks against WEP and WPA\u2016. In: WiSec 2009: Proceedings of the Second ACM Conference on Wireless Network Security. ACM, New York (2009)"},{"issue":"5","key":"44_CR13","first-page":"1563","volume":"2","author":"L. Arockiam","year":"2010","unstructured":"Arockiam, L., Vani, B.: \u2015A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network\u2016. International Journal on Computer Science and Engineering\u00a02(5), 1563\u20131571 (2010)","journal-title":"International Journal on Computer Science and Engineering"},{"issue":"5","key":"44_CR14","first-page":"1563","volume":"2","author":"L. Arockiam","year":"2010","unstructured":"Arockiam, L., Vani, B.: \u2015A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network. International Journal on Computer Science and Engineering\u00a02(5), 1563\u20131571 (2010)","journal-title":"International Journal on Computer Science and Engineering"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Bulbul, H.I., Batmaz, I., Ozel, M.: Wireless Network Security: Comparison of WEP (WiredEquivalent Privacy) Mechanism, WPA (Wi-Fi ProtectedAccess) and RSN (Robust Security Network) Security Protocols, e-Forensics 2008, Adelaide, Australia, January 21-23 (2008)","DOI":"10.4108\/e-forensics.2008.2654"},{"key":"44_CR16","unstructured":"Miller, B.: WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises. Global Knowledge (2008)"},{"key":"44_CR17","first-page":"58","volume":"56","author":"J.L. Macmichael","year":"2005","unstructured":"Macmichael, J.L.: Auditing Wi-Fi Protected Access (WPA) Pre-Shared Key Mode. Linux Journal\u00a0(137), 56, 58\u201360 (2005)","journal-title":"Linux Journal (137)"},{"key":"44_CR18","unstructured":"Cracking Wireless. Ryan Curtin Ryan at, \n                    \n                      igglybob.com"},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"De Rango, F., Lentini, D.C., Marano, S.: Static and dynamic 4-wayhandshake solutions to avoid denial of service attack in Wi-Fi protected access and IEEE 802. I li. EURASIP 1. Wire!\u2019 Commun. Netw.\u00a0(2) (April 2006)","DOI":"10.1155\/WCN\/2006\/47453"},{"key":"44_CR20","doi-asserted-by":"crossref","unstructured":"Scarfone, K., Dicoi, D., Sexton, M., Tibbs, C.: Recommendations of the National Institute of Standards and Technology. Guide to Securing Legacy IEEE 802.11 Wireless Networks (July 2008)","DOI":"10.6028\/NIST.SP.800-48r1"},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Wang, Y., Jin, Z., Zhao, X.: Practical Defence against WEP and WPA-PSK Attack for WLAN (September 2010)","DOI":"10.1109\/WICOM.2010.5600921"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T06:18:18Z","timestamp":1558851498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_44","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}