**Author details**

Rajeev Singh1 \* and Teek Parval Sharma2

1 G.B. Pant University of Agriculture and Technology, Pantnagar, Uttarakhand, India

2 National Institute of Technology, Hamirpur, Himachal Pradesh, India

\*Address all correspondence to: rajeevpec@gmail.com

© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**65**

pp. 157-163

*Security in Wireless Local Area Networks (WLANs) DOI: http://dx.doi.org/10.5772/intechopen.89857*

[1] IEEE 802.11i. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements. 2004; IEEE Standard

Tenth IEEE International Conference on Computer and Communication Technologies, WOCN'13; July 2013;

[9] Newman LH. The Secure Wi-Fi Standard Has a Hugh Dangerous Flaw [Internet]. 2017. Available from: https://www.wired.com/story/ krack-wi-fi-wpa2-vulnerability/

[10] Wi-Fi Alliance. Discover Wi-Fi Security [Internet]. Available from: https://www.wi-fi.org/discover-wi-fi/

[11] Li X, Bao F, Li S, Ma J. FLAP: An efficient WLAN initial access authentication protocol. IEEE

Systems. 2013;**25**(2):488-497

[12] Martinovic I, Zdarsky FA,

Computing. 2013;**2**(3):176-187

Transactions on Parallel and Distributed

Bachorek A, Schmitt JB. Measurement and analysis of handover latencies in IEEE 802.11i secured networks. In: Proceedings of the European Wireless Conference (EW2007); April 2007;

[13] Singh R, Sharma TPA. Secure WLAN authentication scheme. IEEK (Institute of Electronics Engineers of Korea) Transactions on Smart Processing and

[14] Tang C, Wu DO. An efficient mobile authentication for wireless networks. IEEE Transactions on Wireless

Communications. 2008;**7**(4):1408-1416

[16] Singh R, Sharma TP. A key hiding communication scheme for enhancing the wireless LAN security. Springer Wireless Personal Communications.

2014;**77**(2):1145-1165

[15] Park CS. Two-way handshake protocol for improved security in IEEE 802.11 wireless LANs. Computer Communications. 2010;**33**(9):1133-1140

Bhopal. pp. 1-4

security

Paris. pp. 1-7

[2] Singh R, Sharma TP. On the IEEE 802.11i security: A denial of service perspective. Wiley Journal of Security and Communication Networks.

[3] Lepaja S, Maraj A, Efendiu I and Berzati S. The impact of the security mechanisms in the throughput of the WLAN networks. In: Proceedings of the 7th Mediterranean Conference on Embedded Computing; June 2018;

[4] Clancy TC. Secure handover in Enterprise WLANs: CAPWAP, HOKEY, and IEEE 802.11r. IEEE Wireless Communications. 2008;**15**(5):80-85

(IRJET). 2019;**06**(01):537-545

[6] Singh R, Sharma TPA. Location based method for restricting the flooding DoS effect in WLANs. Journal of Location Based Services. 2016;**9**(4):273-295. Taylor and Francis

[7] Singh R, Sharma TP. A key refreshing technique to reduce 4-way handshake latency in 802.11i based networks. In: Proceedings of the Fourth IEEE International Conference on Computer and Communication Technologies, ICCCT'13; September 2013; Allahabad.

[8] Singh R, Sharma TP. A sequence number based WLAN authentication scheme for reducing the MIC field overhead. In: Proceedings of the

[5] Asante M, Akomea-Agyin K. Analysis of security vulnerabilities in Wifiprotected access pre-shared key (WPA-PSK/ WPA2-PSK). International Research Journal of Engineering and Technology

2015;**8**(7):1378-1407

**References**

Budva, Montenegra

*Security in Wireless Local Area Networks (WLANs) DOI: http://dx.doi.org/10.5772/intechopen.89857*
