
The wired equivalent privacy (WEP) protocol presents several vulnerabilities and therefore the IEEE 802.11 should use other cryptosystem, symmetric or asymmetric. For the former, this paper proposes the usage of advanced encryption standard-counter with cipher block chaining-message authentication code (AES-CCM); for the second the usage of elliptic curve cryptosystems (ECC). This paper presents the time required for encrypting the frame body field of the IEEE 802.11 MAC frame using WEP, AES-CCM, and ECC for several data sizes and comparable key sizes. Results confirm that symmetric crypto algorithms are more efficient than those asymmetries for providing the confidentiality service, with WEP being fastest followed by AES-CCM.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 7 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
