Wireless LAN security and IEEE 802.11i

被引:55
|
作者
Chen, JC [1 ]
Jiang, MC
Liu, YW
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu, Taiwan
[2] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu, Taiwan
关键词
D O I
10.1109/MWC.2005.1404570
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This article reviews wireless LAN security with a focus on the evolving new IEEE 802.11i standard. The major security enhancements in encryption and authentication defined by 802.11i are illustrated. In addition, the newly introduced key management in 802.11i is discussed. Because 802.11i incorporates IEEE 802.1X as its authentication enhancement, 802.1X with consideration of roaming users is depicted. Both intrasubnet and intersubnet roaming are illustrated.
引用
收藏
页码:27 / 36
页数:10
相关论文
共 50 条
  • [1] Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol
    Junaid, M.
    Mufti, Muid
    Ilyas, M. Umar
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 11, 2006, 11 : 228 - +
  • [2] Fast and Secure Authentication in IEEE 802.11i Wireless LAN
    Syahputri, Rahmalia
    Sriyanto
    2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), 2012, : 158 - 161
  • [3] IEEE 802.11 Wireless LAN Security Overview
    Al Naamany, Ahmed M.
    Al Shidhani, Ali
    Bourdoucen, Hadj
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 138 - 156
  • [4] Formal verification of the IEEE 802.11i WLAN security protocol
    Sithirasenan, Elankayer
    Zafar, Saad
    Muthukkumarasamy, Vallipuram
    2006 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 181 - +
  • [5] Security Analysis and Authentication Improvement for IEEE 802.11i Specification
    Xing, Xinyu
    Shakshuki, Elhadi
    Benoit, Darcy
    Sheltami, Tarek
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [6] On the IEEE 802.11i security: a denial-of-service perspective
    Singh, Rajeev
    Sharma, Teek Parval
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1378 - 1407
  • [7] Providing tunable security services:: An IEEE 802.11i example
    Lindskog, Stefan
    Brunstrom, Anna
    Faigl, Zoltan
    Toth, Katalin
    2006 SECURECOMM AND WORKSHOPS, 2006, : 463 - +
  • [8] Towards effective wireless intrusion detection in IEEE 802.11i
    Tsakountakis, Alexandros
    Kambourakis, Georgios
    Gritzalis, Stefanos
    THIRD INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, : 37 - +
  • [9] IEEE 802.11i研究综述
    韩旭东
    信息技术与标准化, 2004, (11) : 35 - 39
  • [10] IEEE 802.11i ratification may boost confidence in WLAN security
    Schultz, E
    COMPUTERS & SECURITY, 2004, 23 (06) : 451 - 451