Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 262 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
262
Dung lượng
2,76 MB
Nội dung
[...]... is included to help readers understand the technologies implemented in the providers’ networks to support secure access The xv xvi Security in Wireless LANs and MANs second part discusses the security encapsulation and key management protocols inwirelessLANsWireless roaming and security issues therein are the topics of the third part Security issues inwirelessMANs and the evolution of the security. .. original security designs in wireless LANs and MANs used smaller keys, weak message integrity protocols, weak or one-way authentication protocols, and so forth As wireless networks became popular, the security threats were also highlighted to caution users A security protocol redesign followed first inwirelessLANs and then in wireless MANs This book discusses the security threats and requirements in wireless. .. wireless roaming security, covering two chapters on the following topics: • Chapter 9: Securityin WiFi Roaming One of the main attractions of WLANs is the fact that the mobile user can roam from one service provider to another Chapter 9 introduces the notion of roaming as found in today’s dial-up Internet It then covers the entities involved in roaming, and proceeds to discuss WLAN roaming as defined... credentials, including hardware tokens and smartcards Since a credential represents the “keys to the castle,” its correct and secure management is paramount to the overall security of the organization’s resources, including its network • Accounting, auditing, and tracking: Accounting/auditing, logging, and tracking of connections to an organization’s network are functions that are becoming increasingly important... used in cable modems, employs device certificates As such, this chapter looks into the topic of device certificates as found in the cable modem industry Introduction 5 • Chapter 12: Wireless MAN Security Since security weaknesses were found in 802.11 WLANs, a similar security reevaluation of 802.16 has been under way Chapter 12 provides a discussion and insight into these recent developments on the security. .. 154 III Wireless Roaming Security Chapter 9 Securityin WiFi Roaming 9.1 Introduction 9.2 Roaming in Dial-Up IP Services: Background 9.2.1 The Dial-Up Access Model 9.2.2 Authentication in Dial-Up IP Services 9.2.3 The Network Access Identifier (NAI) 9.2.4 The NAI for Dial-Up Remote Access 9.3 WiFi Roaming: Entities and Models 9.3.1 WiFi Roaming Entities 9.3.2 Roaming Models 9.3.3 WiFi Roaming Security. .. of the security- related components of 802.11 in 2004, with conforming products scheduled to be shipped in 2005 This book aims, in the first instance, to provide a roadmap for readers seeking a deeper understanding of the security aspects of 802.11 WLANs today and the upcoming 802.16 WMANs In order for this book to be a useful technological roadmap to the reader, the discussion sometimes goes into a... of the book is to bring together and explain the other broader areas of networking technology that are being impacted by the advent of 802.11 WLANs and 802.16 WMANs Clearly the 802.11 WiFi phenomenon has gained a tremendous interest in the IP networking industry, and therefore this phenomenon will clearly have an effect on the other technologies and services in the IP networking industry and even the... wirelessLANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues This book is divided into four parts The first part discusses authentication technologies common to securityinwirelessLANs and MANs A...x SecurityinWirelessLANs and MANs 6.2 802.11i Security Goals 6.2.1 Enforcing Authorized Access to a Wired Network 6.2.2 Protection Against Downgrade Attacks 6.2.3 Data Protection 6.3 Components of an RSNA 6.3.1 Security Associations Within an RSNA 6.3.2 RSN IE 6.4 Steps in Establishing an RSN Association 6.5 Mutual Authentication in RSNAs 6.5.1 802.1X and EAP-Based Authentication 6.5.2 PMK Caching . The xv xvi Security in Wireless LANs and MANs second part discusses the security encapsulation and key management protocols in wireless LANs. Wireless roaming and security issues therein are the. 802.11i Security: RSNA 109 6.1 Introduction 109 x Security in Wireless LANs and MANs 6.2 802.11i Security Goals 110 6.2.1 Enforcing Authorized Access to a Wired Network 110 6.2.2 Protection Against. Congress Cataloging -in- Publication Data Hardjono, Thomas. Security in wireless LANs and MANs / Thomas Hardjono, Lakshminath Dondeti. p. cm. — (Artech House computer security series) Includes bibliographical