Building Simple Protection for Wireless-Fidelity Network
This paper describes some of the attacker utilize to disrupt wireless networks through MAC address, and then perform the simple protection through Traffic Protocol Authentication Module (TPAM). This module perform Challenge-Respond based on the hash part of MAC by using the hashing operation, this c...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Mosul University
2009-03-01
|
| Series: | Al-Rafidain Journal of Computer Sciences and Mathematics |
| Subjects: | |
| Online Access: | https://csmj.mosuljournals.com/article_163775_9fe15d1ee61798567766f3dc79f1bd5d.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|