A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
Based on the review of a significant number of domestic and foreign sources, a comparative analysis of the security mechanisms of the Wi-Fi network is carried out, where individual protection standards ... The article is aimed to analyze the basic security mechanisms available in Wi-Fi networks; show the mechanisms for attacking these defenses; carry out a comparative analysis of the effectiveness of protection ...doi:10.15802/stp2020/213042 fatcat:cj4vhx3itza7bil2462jexurmy
Due to the widespread usage of WiFi, securing them is and will continue to be an important task. ... And tries to come to a conclusion on whether WPA3 is still a viable successor or if it has already been compromised beyond repair. ... Authentication WPA3 changes the authentication protocol by adding an additional layer of security in form of the Simultaneous Authentication of Equals (SAE) handshake, a variant of the Dragonfly Handshake ...doi:10.2313/net-2020-11-1_02 fatcat:anncf5r77neohccdusi2cmeoom
In the context of the seminar, each student individually works on a relevant topic in the domain of computer networks supervised by one or more advisors. ... Each semester, the seminar takes place in two different ways: once as a block seminar during the semester break and once in the course of the semester. ...  Figure 3: a diagram detailing the WPA3 SAE Handshake between a connecting client and an AP. ...doi:10.2313/net-2020-11-1 fatcat:7og3fpqf5zfpfldmtsp57bbcg4