2010 | OriginalPaper | Chapter
Security Enhancement in WEP Mobility
Authors : S. M. K. M. Abbas Ahmad, E. G. Rajan, A. Govardhan, Juluru Peraiah
Published in: Recent Trends in Networks and Communications
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
The Wired Equivalent Privacy (WEP) protocol protection technique suggested for ad hoc network falls short of the objective of data privacy, data integrity and authentication. Various security standards such as IEEE 802.11i, WAP, IEEE 802.1X were suggested to address the security issues in 802.11. Despite their efficiency, these standards do not provide any security approach for monitoring the authentication in a distributed architecture. In this paper we present a self monitored security approach for self-monitoring of key authentication for security protocol in ad hoc networks for the efficient monitoring of the authentication issue in ad hoc network. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.