10. Summary and Conclusions
Although Wi-Fi technologies have significantly improved their security capabilities, many of the features and abilities are available only in newer equipment for IT-managed infrastructure. Meanwhile, cellular data networks rely on a completely separate security architecture that emphasizes protection of the radio link and does not provide end-to-end encryption.
Finally, attacks have proven WEP security provided by the 802.11 standard to be insecure. The WLAN industry has responded by creating WPA and 802.11i to address these issues in the long term, though these security solutions are not available today. Most of today’s security requirements can be met with 802.1x, which provides a solution that is effective and has not yet been broken. Most wireless security vendors now offer 802.1x client and server solutions that are available today and provide security that is adequate for enterprise applications.
Keywords
- Access Point
- Advance Encryption Standard
- Cyclic Redundancy Check
- Internet Engineer Task Force
- Extensible Authentication Protocol
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
11. References
Tom Karygiannis and Les Owens, “Wireless Network Security 802.11, Bluetooth and Handheld Devices,” Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Department of Commerce, Gaithersburg, MD 20899-8930, 2002.
“Wireless Network Security,” Proxim Corporation [© 2004 Terabeam Wireless. All rights reserved. Terabeam Wireless, 8000 Lee Highway, Falls Church, VA, 22042], 2003.
George Ou, “Understanding the updated WPA and WPA2 standards,” ZDNet, Copyright © 2005 CNET Networks, Inc. All Rights Reserved. CNET Networks, Inc., 235 Second Street, San Francisco 94105 [1808 Colonial Village Lane Lancaster, PA 17601], June 2, 2005.
John R. Vacca, Firewalls: Jumpstart for Network and Systems Administrators. Digital Press, 2004.
John R. Vacca, Net Privacy: A Guide to Developing and Implementing an Ironclad ebusiness Privacy Plan. McGraw-Hill, 2001.
“Wireless Security Blackpaper,” Copyright © 1998–2005 Ars Technica, LLC, Ars Technica, LLC, 45B West Wilmot Street, Suite 203, Richmond Hill, ON L4B 2P3, Canada, 2005.
Yan Liu, “Wireless Transport Layer Security,” Department of Computer Science, 14 MacLean Hall, Iowa City, IA 52242-1419, 2005.
George Ou, “Gartner Issues False Alarm On Microsoft WPA2 Warning,” ZDNet, Copyright ©2005 CNET Networks, Inc. All Rights Reserved. CNET Networks, Inc., 235 Second Street, San Francisco 94105 [1808 Colonial Village Lane Lancaster, PA 17601], May 27, 2005.
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2006). Standards. In: Guide to Wireless Network Security. Springer, Boston, MA . https://doi.org/10.1007/978-0-387-29845-0_3
Download citation
DOI: https://doi.org/10.1007/978-0-387-29845-0_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-95425-7
Online ISBN: 978-0-387-29845-0
eBook Packages: Computer ScienceComputer Science (R0)