• Cryptanalysis of IEEE 802.11i TKIP 

      Halvorsen, Finn Michael; Haugen, Olav (Master thesis, 2009)
      The Temporal Key Integrity Protocol (TKIP) was created to fix the weaknesses of Wired Equivalent Privacy (WEP). Up until November 2008, TKIP was believed to be a secure alternative to WEP, although some weak points were ...
    • Cryptanalysis of IEEE 802.11i TKIP 

      Halvorsen, Finn Michael; Haugen, Olav (Master thesis, 2009)
      The Temporal Key Integrity Protocol (TKIP) was created to fix the weaknesses of Wired Equivalent Privacy (WEP). Up until November 2008, TKIP was believed to be a secure alternative to WEP, although some weak points were ...
    • Cryptanalysis of IEEE 802.11i TKIP. 

      Lodhi, Ammar (Master thesis, 2010)
      This thesis is based upon the work of Beck and Tews [ 24 ]. It presents and experimentally Validate the Beck and Tews attack on a network with QoS client Associated with a Non- QoS AP.This is done by Slightly extending the ...
    • Detecting Intermediary Hosts by TCP Latency Measurements 

      Singh, Gurvinder; Eian, Martin; Willassen, Svein Yngvar; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2011)
    • Detecting MAC Spoofing Attacks in 802.11 Networks through Fingerprinting on the MAC Layer 

      Idland, Christer (Master thesis, 2011)
      In order to provide hassle-free connection options many wireless local area network (WLAN) providers choose to have their networks completely open. In other words there is no password required in order to connect. Such ...
    • Detecting Wireless Identity Spoofs in Urban Settings, Based on Received Signal Strength Measurements 

      Pedersen, Øystein Aas (Master thesis, 2010)
      The most common gateway for executing attacks in 802.11 networks are the MACspoofing attack. Current Todays Wireless IDS implements different methods todetect MAC spoofing, but are particularly interested in using methods ...
    • Robustness in Wireless Network Access Protocols 

      Eian, Martin (Doctoral Theses at NTNU, 1503-8181; 2012:230, Doctoral thesis, 2012)
      Wireless network access protocols are used in numerous safety critical applications. Network availability is essential for safety critical applications,since loss of availability can cause personal or material damage. An ...
    • Session hijacking in WLAN based public networks 

      Bækkelund, Ørjan (Master thesis, 2009)
      The background for this masters thesis is the threat of session hijacking in public wireless networks. A public wireless network in this context is a network such as Wireless Trondheim where users with WLAN enabled devices ...