802.11 Wireless Networks: The Definitive Guide
802.11 Wireless Networks: The Definitive Guide
Security watch: the WLAN's weakest link
Network Computing
Application of synchronous dynamic encryption system in mobile wireless domains
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
NMACA: a novel methodology for message authentication code algorithms
TELE-INFO'09 Proceedings of the 8th Wseas international conference on Telecommunications and informatics
Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2)
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
WLAN security performance study
NEHIPISIC'11 Proceeding of 10th WSEAS international conference on electronics, hardware, wireless and optical communications, and 10th WSEAS international conference on signal processing, robotics and automation, and 3rd WSEAS international conference on nanotechnology, and 2nd WSEAS international conference on Plasma-fusion-nuclear physics
Journal of Computer Systems, Networks, and Communications
How secure is WiFi MAC layer in comparison with IPsec for classified environments?
Proceedings of the 14th Communications and Networking Symposium
Hi-index | 0.00 |
For the past couple of years, increasing number of wireless local area networks (WLANs), based on the IEEE 802.11 protocols, have been deployed in various types of locations, including homes, schools, airports, business offices, government buildings, military facilities, coffee shops, book stores, as well as many other venues. One of the primary advantages offered by WLAN is its ability to provide untethered connectivity to portable devices, such as wireless laptops and PDAs. In some remote communities, WLANs are implemented as a viable last-mile technology [4], which link homes and offices in isolated locations to the global Internet. The further widespread deployment of WLANs, however, depends on whether secure networking can be achieved. In order for critical data and services to be delivered over WLANs, reasonable level of security must be guaranteed. The WEP (Wired Equivalent Privacy) protocol, originally proposed as the security mechanism of 802.11b WLANs, is known to be easily cracked by commonly available hacking software. Alternative security mechanisms, such as SSL, VPN, Cisco's LEAP, 802.1x, and the being-developed 802.11i protocols, provide mechanisms to enhance security in WLANs. In this paper we study the security aspects of WLANs, by starting with an overview of the WLAN technology and the respective vulnerabilities of various protocols, followed by a discussion of alternative security mechanisms that may be used to protect WLANs. At the end we present a sequence of laboratory designs, which are used as platforms on which attacks at WLANs can be simulated and studied, and alternative security solutions can be implemented and tested.