Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Security problems in 802.11-based networks
Communications of the ACM - Wireless networking security
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
Wireless LAN security and laboratory designs
Journal of Computing Sciences in Colleges
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
Analysis of the 802.11i 4-way handshake
Proceedings of the 3rd ACM workshop on Wireless security
Wireless infidelity II: airjacking
Communications of the ACM - The Blogosphere
Your 80211 wireless network has no clothes
IEEE Wireless Communications
Wireless LAN security and IEEE 802.11i
IEEE Wireless Communications
Hi-index | 0.00 |
Wireless LANs have gone through rapid changes with respect to their security architecture in recent years. One view has been to incorporate WLANs under already existing VPN umbrellas and to view them merely as an alternative access method --- thus preserving existing VPN infrastructure. Another view has been to address the security of the airwaves which has been demonstrated to be extremely vulnerable. The evolution of security standardisation based upon the work of the IEEE has evolved from WEP to WPA which introduced new key management and integrity mechanisms through to WAP2 (IEEE 802.11i) which maintains the management and integrity mechanisms of WPA but introduces AES encryption as well as moving much of the security functionality to the hardware. This paper traces the evolution and development of this new WLAN security architecture.