ANALYZING SECURITY MECHANISMS IN WLAN
Keywords:
communication, WLAN, security, standard, authentication.Abstract
Because of their flexibility, affordability, and ease of installation,
the WLAN have become increasingly popular and widely used.
Besides these advantages, inherent broadcast nature of wireless
networks has raised security concerned. In this study we
analyzing WLAN security standards from point of view of
implementation the major security requirements in
communication systems and the features and weakness of them.
References
Gast M. (2002).Chapter 6: Security, Take 2: 802.1 X, 802.11 Wireless
Networks: The Definitive Guide. O’Reilly. ISBN 0-596-00183-5, April.
Kapp S. (2002). 802.11: leaving the wire behind. Internet Computing,
IEEE. Volume 6 Issue, pages 82-85 , February.
Karygiannis T& L. Owens. (2002). Draft : Wireless Network Security –
11, Bluetooth and Handheld Devices. USA, National Institute of
Standards and Technology.
W. Diffie and M. E. Hellman, “New Directions in Cryptography,†IEEE
Transactions on Information Theory, vol. 22, pp. 644–654, Nov. 1976.
Rescorla, E., “A Survey of Authentication Mechanismsâ€, Internet
Architecture Board (IAB), work in progress, draft-iab-auth-mech-02.txt,
October 2003.
IEEE Std 802.1x-2001: Port Based Network Access Control,
http://www.ieee802.org/1/pages/802.1x.html, June 2001
10. B. Aboba, “Extensible Authentication Protocol (EAP).†RFC 3748
(Standards Track), June 2004.
“IEEE 802 Standardsâ€, http://standards.ieee.org/getieee802
Gast M. (2002), Wired Equivalent Privacy (WEP), 802.11 Wireless
Networks: The Definitive Guide. O’Reilly.
C. He and J. C. Mitchell, “Security Analysis and Improvements for IEEE
11i,†Proceedings of Network and Distributed System Security
Symposium (NDSS), (San Diego, CA), Feb. 2005.