1.
B. R. Nishanth, B. Ramakrishnan, and M. Selvi, "Improved Signcryption Algorithm for Information Security in Networks", Int. J. Comput. Networks Appl., vol. 2, no. 3, pp. 151-157, 2015.
2.
J. Bilger, H. Cosand, N. Singh, and J. Xavier, "Security and Legal Implications of Wireless Networks , Protocols , and Devices 2 . Introduction to Wireless Networking," pp. 1-52, 2005.
3.
E. Tews and M. Beck, "Practical attacks against WEP and WPA," Proc. Second ACM Conf. Wirel. Netw. Secur. - WiSec -09, pp. 79-83, 2009.
4.
U. Kumar and S. Gambhir, "A Literature Review of Security Threats to Wireless Networks," Inernational J. Futur. Gener. Commun. Netw., vol. 7, no. 4, pp. 25-34, 2014.
5.
A. Chiornita, L. Gheorghe, and D. Rosner, "A practical analysis of EAP authentication methods," 9th RoEduNet IEEE Int. Conf., pp. 31-35, 2010.
6.
Q. Qiongfen and L. Chunlin, "On Authentication System Based on 802.1X Protocol in LAN," pp. 2-5, 2010.
7.
J. Lazaro, A. Astarloa, U. Bidarte, J. Jimenez, and A. Zuloaga, "AES-Galois Counter Mode Encryption/Decryption FPGA Core for Industrial and Residential Gigabit Ethernet Communications," in Proceedings of the 5th International Workshop on Reconfigurable Computing: Architectures, Tools and Applications, 2009, pp. 312-317.
8.
W. Alliance, "The State of Wi-Fi Security," no. January, pp. 3-15, 2012.
9.
C. Kolias, G. Kambourakis, A. Stavrou, and S. Gritzalis, "Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset," IEEE Commun. Surv. Tutorials, vol. 18, no. 1, pp. 184-208, 2016.
10.
A. Laing, "The Security Mechanism for IEEE 802.11 Wireless Networks," SANS Inst., vol. 1, no. November, p. 6, 2001.
11.
S. Sotillo, "Extensible Authentication Protocol ( EAP ) Security Issues," Syst. Technol. East Carolina Univ., pp. 1-6, 2007.
12.
J. Salowey, N. Cam-Winget, D. McGrew, and H. Zhou, "The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST) Status," Cisco Syst., pp. 1-64, 2007.
13.
S. M. Hashimi and A. Güne?, "Performance Evaluation of a Network Using Simulation Tools or Packet Tracer," IOSR J. Comput. Eng., vol. 19, no. 1, pp. 01-05, 2017.
14.
G. F. Riley, "Using Networks Simulation in Classroom Education," Proceeding 2012 Winter Simul. Conf., pp. 2837-2841, 2012.
15.
A. Nayyar and R. Singh, "A Comprehensive Review of Simulation Tools for Wireless Sensor Networks ( WSNs )," J. Wirel. Netw. Commun., vol. 5, no. 1, pp. 19-47, 2015.
16.
S. Woon, E. Wu, and A. Sekercioglu, "A Simulation Model of IEEE802.11b for Performance Analysis of Wireless (LAN) Protocols," Proc. Aust. Telecommun. Networks Appl. Conf., pp. 1-4, 2003.
17.
B. Aslam, M. Akhlaq, and S. A. Khan, "IEEE 802 . 11 Wireless Network Simulator Using Verilog," Proc. 11th WSEAS Int. Conf. Commun., vol. 2, pp. 393-398, 2007.
18.
M. A. Catur Bhakti, A. Abdullah, and L. T. Jung, "EAP-based authentication with EAP method selection mechanism," 2007 Int. Conf. Intell. Adv. Syst. ICIAS 2007, no. December, pp. 393-396, 2007.
19.
K. Yang and J. Ma, "Implementation of IEEE802.1x in OPNET," 2008 Asia Simul. Conf. - 7th Int. Conf. Syst. Simul. Sci. Comput. ICSC 2008, pp. 1390-1394, 2008.
20.
M. H. Noshy and A. Z. Mahmoud, "Performance Comparison between LTE and WiMAX Based on Link Level Simulation," Int. J. Comput. Networks Appl., vol. 4, no. 5, pp. 121-128, 2017.
21.
J. Pan and R. Jain, "A survey of network simulation tools: Current status and future developments," Washingt. Univ. St. Louis, Tech. Rep, pp. 1-13, 2008.
22.
T. Jeffree, P. Congdon, and M. Seaman, IEEE Standard for Local and Metropolitan area networks - Port-Based network Access Control, Revision o. New York, USA: IEEE Computer Society, 2010.
23.
H. W. Lee, K. Kim, W. Ryu, and B. S. Lee, "Performance of an efficient performing authentication to obtain access to public wireless LAN with a cache table," IEEE Int. Conf. Commun., vol. 5, no. c, pp. 2376-2381, 2006.
24.
S. T. Chandel and S. Sharma, "Performance Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks," Int. J. Comput. Networks Appl., vol. 3, no. 3, p. 59, 2016.
25.
P. Mittal, "Implementation of a Novel Protocol for Coordination of Nodes in Manet," Int. J. Comput. Networks Appl., vol. 2, no. 2, pp. 99-105, 2015.
26.
S. Zafar, "Throughput and Delay Analysis of AODV , DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks," Int. J. Comput. Networks Appl., vol. 3, no. 2, pp. 25-31, 2016.
27.
C. T. Clancy, A. Mishra, H. M. Shin, J. l Petroni, and Wi. A. Arbaugh, "Proactive Key Distribution Using Neighbor Graphs," IEEE Wirel. Commun., no. February, pp. 26-36, 2004.
28.
X. Liu and A. O. Fapojuwo, "An Efficient Sim-Based Authentication and Key Distribution Method for Wireless LANS," no. May, pp. 1169-1172, 2005.
29.
ITU-T, "Transmission Systems and Media Digital Systems and Networks," Int. Telecommun. Union, pp. 1-3, 2003.
30.
S. Shin, A. G. Forte, A. S. Rawat, and H. Schulzrinne, "Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs," MobiWac '04 Proc. Second Int. Work. Mobil. Manag. Wirel. access Protoc., pp. 19-26, 2004.