{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T20:12:09Z","timestamp":1654114329642},"reference-count":9,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1,1]]},"abstract":"<p>Wireless communication has become increasingly popular due to development of internetworking. In this paper, the hidden security problems of IEEE802.11i in wireless LAN are presented. To solve them, the implementation of SA Query Mechanism of wireless devices is well-designed, based on Security Association (SA) Query mechanism proposed according to the IEEE 802.11w protocol. As to the reality, the implementation mentioned above is especially significant while plenty of wireless devices are lack of SA query mechanism, which is necessary in 802.11w protocol. In the last part, certain security risks of SA query mechanism are also discussed in this essay as supplementary.<\/p>","DOI":"10.4018\/ijitn.2015010102","type":"journal-article","created":{"date-parts":[[2015,6,18]],"date-time":"2015-06-18T18:37:28Z","timestamp":1434652648000},"page":"13-26","source":"Crossref","is-referenced-by-count":0,"title":["Exploration on SA Query Mechanism in IEEE 802.11w"],"prefix":"10.4018","volume":"7","author":[{"given":"Yong","family":"Lu","sequence":"first","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"given":"Jingjing","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]},{"given":"Lu","family":"Ning","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Yi","family":"Huang","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, Beijing, China"}]}],"member":"2432","reference":[{"key":"ijitn.2015010102-0","unstructured":"Ahmad, M. S., Murthy, J. V. R., & Vartak, A. (2008). Autoimmunity disorder in wireless LANs. DEF CON, 16."},{"key":"ijitn.2015010102-1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998424"},{"key":"ijitn.2015010102-2","unstructured":"Cisco (2014).Cisco Wireless LAN Controller Configure Guide, Release 7.6.Retrieved from http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/controller\/7-6\/configuration-guide\/b_cg76\/b_cg76_chapter_01001101.html"},{"key":"ijitn.2015010102-3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_25"},{"key":"ijitn.2015010102-4","doi-asserted-by":"crossref","unstructured":"Eian, M., & Mjolsnes, S. F. (2012, March). A formal analysis of IEEE 802.11 w deadlock vulnerabilities. In INFOCOM, 2012 Proceedings IEEE. IEEE, 918-926.","DOI":"10.1109\/INFCOM.2012.6195841"},{"key":"ijitn.2015010102-5","unstructured":"IEEE 802.11 Working Group. (2009, September). IEEE Standard for Information Technology\u2013Telecommunications and information exchange between systems\u2013Local and metropolitan area networks\u2013Specific requirements-Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 4: Protected Management Frames. IEEE Std, 802, 11w."},{"key":"ijitn.2015010102-6","unstructured":"Mitchell, C. H. J. C. (2005). Security Analysis and Improvements for IEEE 802.11 i. In The 12th Annual Network and Distributed System Security Symposium (NDSS'05) Stanford University, Stanford, 90-110."},{"key":"ijitn.2015010102-7","doi-asserted-by":"crossref","unstructured":"Wang, W., & Wang, H. (2011, November). Weakness in 802.11 w and an improved mechanism on protection of management frame. In Wireless Communications and Signal Processing (WCSP), 2011 International Conference on. IEEE, 1-4.","DOI":"10.1109\/WCSP.2011.6096780"},{"key":"ijitn.2015010102-8","unstructured":"Xiao, Z. (2013). Discussion about security issues of wireless LAN communication .Digital Technology and Application, (7), 167-167."}],"container-title":["International Journal of Interdisciplinary Telecommunications and Networking"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=130901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:49:17Z","timestamp":1654112957000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijitn.2015010102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2015,1,1]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijitn.2015010102","relation":{},"ISSN":["1941-8663","1941-8671"],"issn-type":[{"value":"1941-8663","type":"print"},{"value":"1941-8671","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,1]]}}}