The IEEE 802.11 Handbook: A Designer's Companion
The IEEE 802.11 Handbook: A Designer's Companion
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Secure authentication system for public WLAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
A Secure Wireless Agent-based Testbed
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Analysis of the 802.11i 4-way handshake
Proceedings of the 3rd ACM workshop on Wireless security
Fast authentication methods for handovers between IEEE 802.11 wireless LANs
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Securing Wireless Networks in a University Environment
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
802.11 Wireless Networks: The Definitive Guide, Second Edition
802.11 Wireless Networks: The Definitive Guide, Second Edition
Wireless LAN security and IEEE 802.11i
IEEE Wireless Communications
A note on the fragility of the "Michael" message integrity code
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
The purpose of this document is to provide guidance to organizations in securing their legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. The document provides an overview of legacy IEEE 802.11 WLAN standards, components, and architectural models. It discusses the basics of WLAN security and examines the security capabilities provided by legacy IEEE 802.11 standards. The document also discusses threats and vulnerabilities involving legacy IEEE 802.11 WLANs, explains common countermeasures, and makes recommendations for their use.