Towards Using Certificate-Based Authentication as a Defense Against Evil Twins in 802.11 Networks

Wireless clients are vulnerable to exploitation by evil twins due to flaws in the authentication process of 802.11 Wi-Fi networks. Current certificate-based wireless authentication protocols present a potential solution, but are limited in their ability to provide a secure and usable platform for ce...

Full description

Bibliographic Details
Main Author: Hendershot, Travis S.
Format: Others
Published: BYU ScholarsArchive 2016
Subjects:
Online Access:https://scholarsarchive.byu.edu/etd/6115
https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7115&context=etd

Similar Items