{"id":"https://openalex.org/W2021755187","doi":"https://doi.org/10.1109/cisim.2010.5643656","title":"On enhancing the WEP security against brute-force and compromised keys","display_name":"On enhancing the WEP security against brute-force and compromised keys","publication_year":2010,"publication_date":"2010-10-01","ids":{"openalex":"https://openalex.org/W2021755187","doi":"https://doi.org/10.1109/cisim.2010.5643656","mag":"2021755187"},"language":"en","primary_location":{"id":"doi:10.1109/cisim.2010.5643656","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisim.2010.5643656","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104108411","display_name":"Saif Rehman","orcid":"https://orcid.org/0009-0000-4430-1452"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Saif Ur Rehman","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, National University of Science and Technology, Islamabad, Pakistan","School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, National University of Science and Technology, Islamabad, Pakistan","institution_ids":[]},{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001186931","display_name":"Saeed Ullah","orcid":"https://orcid.org/0000-0001-8946-7640"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Saeed Ullah","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, National University of Science and Technology, Islamabad, Pakistan","School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, National University of Science and Technology, Islamabad, Pakistan","institution_ids":[]},{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111155841","display_name":"Sardar Ali","orcid":null},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sardar Ali","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, National University of Science and Technology, Islamabad, Pakistan","School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, National University of Science and Technology, Islamabad, Pakistan","institution_ids":[]},{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5104108411"],"corresponding_institution_ids":["https://openalex.org/I929597975"],"apc_list":null,"apc_paid":null,"fwci":1.4245,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.81999311,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"e83 d","issue":null,"first_page":"250","last_page":"254"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9657999873161316,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9657999873161316,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9639999866485596,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9614999890327454,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.756089448928833},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7548246383666992},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5879391431808472},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5328394174575806},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.5233694314956665},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4733966588973999}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.756089448928833},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7548246383666992},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5879391431808472},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5328394174575806},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.5233694314956665},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4733966588973999}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisim.2010.5643656","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisim.2010.5643656","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5400000214576721,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1510112814","https://openalex.org/W1515716392","https://openalex.org/W1556597491","https://openalex.org/W2114566185","https://openalex.org/W2145994227","https://openalex.org/W2409433878","https://openalex.org/W6630462455","https://openalex.org/W6630883861","https://openalex.org/W6633270410"],"related_works":["https://openalex.org/W2385743990","https://openalex.org/W2350176425","https://openalex.org/W1499266877","https://openalex.org/W2535398559","https://openalex.org/W4245233789","https://openalex.org/W4248712873","https://openalex.org/W2393941228","https://openalex.org/W3106115593","https://openalex.org/W2390312744","https://openalex.org/W648677723"],"abstract_inverted_index":{"The":[0,75],"IEEE":[1],"802.11":[2],"standard":[3,105],"uses":[4],"Wired":[5],"Equivalent":[6],"Privacy":[7],"(WEP)":[8],"for":[9,46],"data":[10],"encryption":[11,32,87],"in":[12,24,48,103],"wireless":[13],"Local":[14],"Area":[15],"Networks.":[16],"So":[17],"far,":[18],"different":[19,60],"flaws":[20],"have":[21],"been":[22],"discovered":[23],"the":[25,31,36,49,80,95,104,108,112],"security":[26,37,96],"of":[27,38,63,97,111],"WEP.":[28],"Frequently":[29],"changing":[30],"key":[33,65,72,88],"can":[34,92],"improve":[35,94],"WEP":[39,98],"but":[40],"there":[41],"is":[42,84],"no":[43],"built-in":[44],"provision":[45],"this":[47,52],"standard.":[50],"In":[51],"paper":[53],"first":[54],"we":[55],"present":[56],"and":[57,67],"critically":[58],"review":[59],"possible":[61],"methods":[62],"automatic":[64],"updating":[66],"then":[68],"propose":[69],"a":[70],"dynamic":[71],"management":[73],"technique.":[74],"proposing":[76],"technique":[77],"works":[78],"at":[79,107],"application":[81],"layer.":[82],"It":[83],"an":[85],"automated":[86],"updation":[89],"method":[90],"that":[91],"significantly":[93],"without":[99],"requiring":[100],"any":[101],"changes":[102],"or":[106],"lower":[109],"layers":[110],"OSI":[113],"model.":[114]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
