{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:49:14Z","timestamp":1729637354952,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/netcom.2009.75","type":"proceedings-article","created":{"date-parts":[[2010,1,20]],"date-time":"2010-01-20T16:12:13Z","timestamp":1264003933000},"page":"104-108","source":"Crossref","is-referenced-by-count":4,"title":["An Improved Method of Detecting Spoofed Attack in Wireless LAN"],"prefix":"10.1109","author":[{"given":"Shikha","family":"Goel","sequence":"first","affiliation":[]},{"given":"Sudesh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Kismet","year":"0","key":"ref10"},{"journal-title":"Net Stumbler","year":"0","key":"ref11"},{"key":"ref12","article-title":"802.11i and WPA up Close","author":"robinson","year":"2004","journal-title":"Network Computing"},{"key":"ref13","article-title":"Wireless LAN Security","author":"goyal","year":"0","journal-title":"Center for Information and Network Security"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/11496137_29","article-title":"Efficient constructions for one-way hash chains","author":"hu","year":"2005","journal-title":"Proceeding of Applied Cryptography and Network Security (ACNS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/941322.941324"},{"key":"ref16","first-page":"749","article-title":"Lhap: A lightweight hop-by-hop authentication protocol for ad-hoc networks","author":"zhu","year":"2003","journal-title":"Proc IEEE Int Workshop on Mobile and Wireless Network"},{"key":"ref17","article-title":"Sequence number-based MAC address spoof detection","author":"guo","year":"2005","journal-title":"Proceedings of the 8th International Symposium on recent Advances in Intrusion Detection Seattle"},{"key":"ref18","first-page":"309","article-title":"Sequence number-based MAC address spoof detection","author":"guo","year":"2005","journal-title":"Proceedings of the 9th international symposium on recent advances on intrusion detection RAID"},{"journal-title":"Snort-wireless 802 11 intrusion detection system","year":"0","key":"ref19"},{"key":"ref4","first-page":"26","article-title":"Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks","author":"anbd","year":"2005","journal-title":"Proceedings of AusCERT Asia Pacific Information Technology Security Conference (AusCert 2005)"},{"key":"ref3","article-title":"An initial security analysis of the ieee 802.1x standard","author":"mishra","year":"2002","journal-title":"University of Maryland Technical Report CS-TR-4328"},{"journal-title":"IEEE Tech Rep","article-title":"1999 edition (r2003) part 11: Wireless LAN medium access control (MAC) and physical layer phy) specifications","year":"1999","key":"ref6"},{"key":"ref5","first-page":"221","article-title":"Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks","volume":"54","author":"gill","year":"2006","journal-title":"Fourth Australasian Information Security Workshop (Network Security) (AISW 2006)"},{"journal-title":"SMAC MAC-Address-Changer","year":"0","key":"ref8"},{"article-title":"Synchronization attacks against 802.11","year":"0","author":"khanna","key":"ref7"},{"key":"ref2","article-title":"Security analysis and improvements for ieee 802.11i","author":"he","year":"2005","journal-title":"NDSS"},{"key":"ref1","first-page":"15","article-title":"802.11 denial-of-service attacks: Real vulnerabilities and practical solutions","author":"bellardo","year":"0"},{"journal-title":"MACMakeUp MAC Address Spoofing Tools","year":"0","key":"ref9"},{"key":"ref20","article-title":"New Methods of Spoof detection in 802.11b wireless networks","author":"madory","year":"2006","journal-title":"Hanover NH M Eng Thesis Dartmouth College"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2006.278663"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.910236"},{"key":"ref24","first-page":"749","article-title":"LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks","author":"zhu","year":"2003","journal-title":"IEEE International Workshop on Mobile and Wireless Network (MWN 2003)"},{"key":"ref23","article-title":"Detecting and Localizing Wireless Spoofing Attacks","author":"yingying","year":"2007","journal-title":"IEEE"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2008.4772621"}],"event":{"name":"2009 First International Conference on Networks & Communications","start":{"date-parts":[[2009,12,27]]},"location":"Chennai, India","end":{"date-parts":[[2009,12,29]]}},"container-title":["2009 First International Conference on Networks &amp; Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5379701\/5383944\/05384007.pdf?arnumber=5384007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T23:55:08Z","timestamp":1497830108000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5384007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/netcom.2009.75","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}