أمن الشبكات اللاسلكية المخاطر والحماية
Main Article Content
Abstract
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
E. Tews, R. P. Weinmann and A. Pyshkin, “Breaking
bit WEP in lessthan 60 seconds,” IACR Eprint
Server, http://eprint.iacr.org/ 2007/120.pdf , number
/120, Accessed April 1, 2007.
Anil Kumar Singh, Bharat Mishra and Sandeep Singh
“WLAN Security Flaw: Cracking 64 bit WEP Key,”
IJCSI International Journal of Computer Science
Issues, Vol. 7, Issue 6, pp. 296-299, Nov. 2010.
Hassan Tahir, Syed Asim Ali Shah, Wireless Sensor
Networks - A Security Perspective. Multi topic
Conference, INMIC 2008. IEEE International
Tanveer A. Zia, An overview of wireless sensor
networks and their security issues. Advanced
Networks Research Group, School of Information
Technologies, 2010, University of Sydney
Michael Healy, Thomas Newe, Elfed Lewis, Security
for Wireless Sensor Networks: A Review, IEEE
Sensors Applications Symposium New Orleans, LA,
USA – 2009
Ali Nur Mohammad Noman, A Generic Framework
For Defining Security Environments Of Wireless
Sensor Networks, 5th International Conference on
Electrical and Computer Engineering ICECE 2008,
Dhaka, Bangladesh
Panu Hämäläinen, Mauri Kuorilehto, Timo Alho,
Marko Hännikäinen, Timo D. Hämäläinen: Security in
Wireless Sensor Networks: Considerations and
Experiments. SAMOS 2006
T.Kavitha, D.Sridharan, Security Vulnerabilities In
Wireless Sensor Networks: A Survey, Journal of
Information Assurance and Security, Vol. 5, 2010
"NetSpot: WiFi Site Survey Software for MAC OS X &
Windows"
Kaufman, Charlie; Perlman, Radia; Speciner, Mike.
Network Security: Private Communication in a Public
World, Second Edition. Prentice Hall PTR. p. 169.
ISBN 978-0-13-046019-6
Margaret Rouse. "Encryption". TechTarget.
Retrieved 26 May 2015.
Penetration Tester's Open Source Toolkit by Johnny
Long and others, Syngress Publishing, Inc., 2006,
page 301.
"SMAC 2.0 MAC Address Changer".
klcconsulting.com. Retrieved 2008-03-17.
]14[ مقااا بعنااوا تقنيااات التشااوير اااح الشاابكات اللاساالكية، جمياا طويلاا ، 27 نااوامبر
.
]15[ مقا بعنوا مصاشد محتراح الشبكات ، Isecur1ty ، 11 سبتمبر 2016
Wireless Security Handbook by Aaron E. Earle,
Auerbach Publications, 2006, pages 319- 320. DOI: https://doi.org/10.1080/00497870600571984
International Journal of Multimedia and Ubiquitous
Engineering, Vol. 3, No. 3, July, 2008 , 83 DOI: https://doi.org/10.1049/et:20081828