Wireless LAN security and IEEE 802.11i

被引:55
|
作者
Chen, JC [1 ]
Jiang, MC
Liu, YW
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu, Taiwan
[2] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu, Taiwan
关键词
D O I
10.1109/MWC.2005.1404570
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This article reviews wireless LAN security with a focus on the evolving new IEEE 802.11i standard. The major security enhancements in encryption and authentication defined by 802.11i are illustrated. In addition, the newly introduced key management in 802.11i is discussed. Because 802.11i incorporates IEEE 802.1X as its authentication enhancement, 802.1X with consideration of roaming users is depicted. Both intrasubnet and intersubnet roaming are illustrated.
引用
收藏
页码:27 / 36
页数:10
相关论文
共 50 条
  • [31] Positioning with IEEE 802.11b wireless LAN
    Kotanen, A
    Hännikäinen, M
    Leppäkoski, H
    Hämäläinen, TD
    PIMRC 2003: 14TH IEEE 2003 INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS PROCEEDINGS, VOLS 1-3 2003, 2003, : 2218 - 2222
  • [32] A survey of QoS enhancements for IEEE 802.11 wireless LAN
    Ni, Q
    Romdhani, L
    Turletti, T
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2004, 4 (05): : 547 - 566
  • [33] Performance evaluation of the IEEE 802.11 wireless LAN standards
    Shaaban, Sarah
    El Badawy, Hesham M.
    Hashad, Attallah
    WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 781 - +
  • [34] Improvement of IEEE 802.11 for multimedia traffic in wireless LAN
    Ngoc, Do Minh
    Tan, Phan Anh
    Lee, Jong Soo
    Oh, Hoon
    2007 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, 2007, : 20 - 23
  • [35] An adaptive polling scheme for IEEE 802.11 wireless LAN
    Kim, KJ
    Kim, HS
    Lee, SD
    Han, KJ
    Security and Privacy in the Age of Ubiquitous Computing, 2005, 181 : 239 - 249
  • [36] Providing throughput guarantees in IEEE 802.11 Wireless LAN
    Banchs, A
    Pérez, X
    WCNC 2002: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1 & 2, 2002, : 130 - 138
  • [37] Autonomic 802.11 wireless LAN security auditing
    Branch, JW
    Petroni, NL
    Van Doorn, L
    Safford, D
    IEEE SECURITY & PRIVACY, 2004, 2 (03) : 56 - 65
  • [38] 浅谈WAPI较之于IEEE 802.11i
    胡畅
    郭灵军
    移动通信, 2009, 33 (24) : 5 - 9
  • [39] Design and implementation of efficient cipher engine for IEEE 802.11i compatible with IEEE 802.11n and IEEE 802.11e
    Bae, D
    Kim, G
    Kim, J
    Park, S
    Song, O
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 439 - 444
  • [40] A Survey on Wireless Security protocols (WEP, WPA and WPA2/802.11i)
    Lashkari, Arash Habibi
    Danesh, Mir Mohammad Seyed
    Samadi, Behrang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 48 - +