Wireless Handheld Devices Become Trusted Network Devices

  • Authors:
  • Kevin Curran;Paul Canning

  • Affiliations:
  • University of Ulster, Northern Ireland, UK;University of Ulster, Northern Ireland, UK

  • Venue:
  • Information Systems Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the world of information technology, a security model is only as secure as its weakest link. There are several layers of security and different measures that can currently be implemented. However, they lack coordination, and therefore potential security breaches might compromise the network. With wireless access becoming the norm, and users requiring "on the move communication" even within a campus, networks are expanding past the traditional wired networks by adding wireless access points. This gives customers the flexibility they require but leaves a net threat vector to the network. There have been various encryption and security steps taken to validate the communication and authentication of the devices and end users connecting. This project addresses the critical problem of secure authentication using the 802.1x standard, which will be implemented using Microsoft's Radius server elements. It will involve the enrollment of secure certificates on Windows mobile devices, thus securing mobile devices from physical attacks. To ensure that all steps are adhered to, that all necessary applications have been installed, and to handle Web service communication, an application will be created that will provide an automated solution.