[...]... 8 .14 .4 How WPANs differ from WLANs 8 .14 .5 Power Levels and Coverage 8 .14 .6 Control of the Medium 10 0 10 0 10 0 10 1 10 2 10 2 10 4 10 6 10 7 13 1 13 2 13 2 13 3 13 4 13 6 13 6 13 7 13 7 13 7 13 8 13 8 13 8 13 9 13 9 13 9 14 0 14 1 14 2 14 3 14 4 14 5 14 7 14 7 14 8 15 0 15 1 15 2 15 2 xii CONTENTS 8 .14 .7 Lifespan of the Network 8 .14 .8 802 .15 Security ... 11 .8 Security Threats 11 .8 .1 Denial-of-Service Attack 11 .8.2 Replay Attacks 11 .8.3 Theft of Information or Passive Eavesdropping 18 7 18 7 18 8 18 9 19 0 19 0 19 0 19 0 19 0 19 2 19 3 19 3 19 5 19 5 19 9 2 01 202 202 202 203 CONTENTS xiii 11 .9 11 .8.4 Session-Stealing (for Theft of Information) Attack 203 11 .8.5 Secure... 9 .1. 3 Multibit EAS Tags 9 .1. 4 Summary of Limitations of RFID Technologies in their Current State of Development 9 .1. 5 What are Transponders? 9 .1. 6 How RFID Systems Work 16 1 16 1 16 1 16 2 16 3 8 .15 8 .16 9 16 8 16 9 17 8 10 Connecting the Last Mile 18 3 10 .1 Introduction 18 3... 11 .4.3 Tokens/Smart Cards 11 .4.4 SSL Protected Messages 11 .5 Digital Certificates 11 .6 Wireless Transport Layer Security (WTLS) 11 .6 .1 WTLS 11 .6.2 WAP 11 .6.3 WEP 11 .6.4 WPKI 11 .7 Authentication... 18 3 10 .2 LMDS 18 4 11 Wireless Information Security (W-INFOSEC) 11 .1 Introduction 11 .2 Public Key Infrastructure (PKI) 11 .3 What is a PKI? 11 .4 PKI and Other Security Methods 11 .4 .1 Username/Password 11 .4.2 Biometrics... 204 12 Convergence: 3RD Generation Technologies 12 .1 CDMA2000 12 .2 CDMA2000 Types 12 .2 .1 CDMA2000 1X 12 .2.2 CDMA2000 1X EV-DO 12 .2.3 CDMA2000 1X EV-DV 12 .2.4 CDMA2000 3X 12 .3 Operator Benefits of CDMA2000 12 .3 .1. .. 8 .11 .4 Probing Phase 8 .11 .5 Authentication Phase 8 .11 .6 Association Phase Wireless Tools 8 .12 .1 Basic Tools 8 .12 .2 Advanced Tools Penetration Testing on 802 .11 8 .13 .1 Installing the ORiNOCO NIC 8 .13 .2... 8 .14 .9 Authentication The 802 .16 Standard Mobile IP 8 .16 .1 The Security of Mobile IP 15 4 15 4 15 6 15 8 15 8 15 8 RFID 9 .1 Introduction 9 .1. 1 What are RFID Systems? 9 .1. 2 EAS Systems... 8.9 .1 Potential Security Issues with Wireless LAN Systems Overview of 802 .11 b Security Mechanisms 8 .10 .1 SSID – Network Name 8 .10 .2 WEP – Wired Equivalent Privacy Authentication and Association 8 .11 .1 Authentication Process 8 .11 .2 Association Process 8 .11 .3 Authenticated... 8.8 8.9 8 .10 8 .11 8 .12 8 .13 8 .14 The Frequency Hopping Spread Spectrum (FHSS) PHY 8.7.3 Infrared (IR) PHY 8.7.4 Physical Layer Extensions to IEEE 802 .11 8.7.5 Geographic Regulatory Bodies The 802 .11 Standards (WLAN or WI-FI) 8.8 .1 Defining Wireless LAN Requirements 8.8.2 Minimizing 802 .11 Interference . 19 2 11 .6 Wireless Transport Layer Security (WTLS) 19 3 11 .6 .1 WTLS 19 3 11 .6.2 WAP 19 5 11 .6.3 WEP 19 5 11 .6.4 WPKI 19 9 11 .7 Authentication and Integrity 2 01 11. 8 Security Threats 202 11 .8 .1 Denial-of-Service. PKI? 18 9 11 .4 PKI and Other Security Methods 19 0 11 .4 .1 Username/Password 19 0 11 .4.2 Biometrics 19 0 11 .4.3 Tokens/Smart Cards 19 0 11 .4.4 SSL Protected Messages 19 0 11 .5 Digital Certificates 19 2 11 .6. Work 17 8 10 Connecting the Last Mile 18 3 10 .1 Introduction 18 3 10 .2 LMDS 18 4 11 Wireless Information Security (W-INFOSEC) 18 7 11 .1 Introduction 18 7 11 .2 Public Key Infrastructure (PKI) 18 8 11 .3