Implementation and performance analysis of IEEE 802.11i standard using the IXP425 network processor
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A novel idle mode operation in IEEE 802.11 WLANs: prototype implementation and empirical evaluation
WMASH '06 Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots
A survey on emerging broadband wireless access technologies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 5th ACM international workshop on Mobility management and wireless access
The myths and truths of wireless security
Communications of the ACM - Alternate reality gaming
Secure authentication in heterogeneous wireless networks
Mobile Information Systems - Mobile Systems and Applications
Design and analysis of WiMAX's security system on FPGA
EHAC'08 Proceedings of the 7th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Security aspects in wireless networks
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
Link-layer protection in 802.11i WLANS with dummy authentication
Proceedings of the second ACM conference on Wireless network security
Framework for integrating heterogeneous wireless networks using mobile IP
CEA'09 Proceedings of the 3rd WSEAS international conference on Computer engineering and applications
A secure and lightweight approach for routing optimization in mobile IPv6
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2)
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Design of WLAN secure system against weaknesses of the ieee 802.1x
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Aegis: physical space security for wireless networks with smart antennas
IEEE/ACM Transactions on Networking (TON)
Improved security in IEEE 802.11 wireless LANs
DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Adaptation of IEEE 802.1x for secure session establishment between ethernet peers
ICISS'06 Proceedings of the Second international conference on Information Systems Security
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
Security and handover designs for VoWLAN system
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Hi-index | 0.00 |
This article reviews wireless LAN security with a focus on the evolving new IEEE 802.11i standard. The major security enhancements in encryption and authentication defined by 802.11i are illustrated. In addition, the newly introduced key management in 802.11i is discussed. Because 802.11i incorporates IEEE 802.1X as its authentication enhancement, 802.1X with consideration of roaming users is depicted. Both intrasubnet and intersubnet roaming are illustrated.