Book contents
- Frontmatter
- Contents
- Authorship by Chapter
- Foreword
- Preface
- Part I Introduction to 802.11
- Part II 802.11 Quality of Service
- Part III 802.11 Security
- Chapter 6 Understanding and Achieving Next-Generation Wireless Security
- Chapter 7 Wireless Local Area Network Security
- Part IV High Throughput 802.11
- Part V 802.11 Mesh Networks
- Part VI 802.11/Cellular Interworking
- Part VII Coexistence
- Part VIII 802.11 Network and Radio Resource Management
- Part IX 802.11 Range
- Part X 802.11 Hardware Design
- Part XI Wi-Fi Hotspots
- Part XII Wi-Fi Applications
- Part XIII Ultra WideBand (UWB)
- Part XIV Public Wireless Broadband
- Epilogue
- Index
Chapter 7 - Wireless Local Area Network Security
from Part III - 802.11 Security
Published online by Cambridge University Press: 10 December 2009
- Frontmatter
- Contents
- Authorship by Chapter
- Foreword
- Preface
- Part I Introduction to 802.11
- Part II 802.11 Quality of Service
- Part III 802.11 Security
- Chapter 6 Understanding and Achieving Next-Generation Wireless Security
- Chapter 7 Wireless Local Area Network Security
- Part IV High Throughput 802.11
- Part V 802.11 Mesh Networks
- Part VI 802.11/Cellular Interworking
- Part VII Coexistence
- Part VIII 802.11 Network and Radio Resource Management
- Part IX 802.11 Range
- Part X 802.11 Hardware Design
- Part XI Wi-Fi Hotspots
- Part XII Wi-Fi Applications
- Part XIII Ultra WideBand (UWB)
- Part XIV Public Wireless Broadband
- Epilogue
- Index
Summary
The specification and broad adoption of strong AES-based encryption and data authentication and strong end user authentication in IEEE 802.11 Wireless Local Area Network (WLAN) systems provide strong link layer security. Since the wireless link for data traffic is secure, standards work now turns to the protection of management frames and implementers look to deploy intrusion detection tools, while attackers look for implementation-flaw based attacks, such as “fuzzing”. This chapter discusses the topics of WLAN link security, key management, end user authentication, standards, wireless driver vulnerability attacks and wireless intrusion detection techniques.
Introduction
The level of required security in a system changes over time, as technology and export regulations change and as the processing capabilities of both valid users and potential attackers increase. One static aspect, however, is the need for end users to adhere to recommended security practices, such as keeping up-to-date virus software and intrusion detection software on their laptops or client devices. There are conflicting requirements of security and convenience. End users desire a simple, quick logon using stored passwords on client devices; however, for stronger authentication, particularly in enterprise networks, two separate credentials from the user, a password and a time-changing code are typically required. This is similar to the credentials required to withdraw cash from an ATM, you must present both a password (something you know) and the appropriate ATM card (something you have).
- Type
- Chapter
- Information
- Emerging Technologies in Wireless LANsTheory, Design, and Deployment, pp. 145 - 178Publisher: Cambridge University PressPrint publication year: 2007