FENG Zhifang, PENG Fei, MAFan. Analysis of four generationWi-Fi encryption technology[J]. Information and Communications Technology and Policy, 2019, 45(11): 89-92.
Jon Edney, William A. Arbaugh. Real 802.11 security Wi-Fi protected access and 802.11i[M]. Boston: Addison Wesley,2005.
[2]
胡向东, 魏琴芳, 胡蓉. 应用密码学第三版[M]. 北京: 清华大学出版社, 2014.
[3]
Mathy Vanhoef, Frank Piessens. Key reinstallation attacks:forcing nonce reuse in WPA2[C]. 2017 ACM SIGSAC Conference on Computer and Communications Security TX. USA:CCS, 2017.
[4]
Dan Harkind. Simultaneous authentication of equals: a secure, password- based key exchange for mesh networks[C].2008 Second International Conference on Sensor Technologies and Applications , Cap Esterel, France. USA: IEEE, 2008.