WLAN security threats & solutions

被引:0
|
作者
Majstor, F [1 ]
机构
[1] Cisco Syst, Brussels, Belgium
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This session will give an overview of the latest security trends in the 802.11 based WLAN technology. WLAN technology in security terms had a hard start with early discovery of multiple weaknesses built into it by the design, or discovered afterwards by the inappropriate use of the crypto technology. Initial development of the WEP (Wire Equivalent Privacy) protocol had missed to address the key exchange mechanism as well as individual user authentication. On top of that it does not provide either crypto integrity checking mechanism or replay protection. Immediately after their discovery and public announcements most of the mentioned weaknesses also got publicly available tools on the Internet for their testing and unfortunately, also possible abuse. There are currently two solution paths in industry for securing the WLAN technology. IEEE and IETF standardization bodies have already developed and proposed multiple protocols such as 802.1x and multiple new EAP's (Extended Authentication Protocol) to address security weaknesses in the user authentication and the lack of a key management. The IEEE TGi (Task Group i) is working on a comprehensive solution within the 802.11i standard to address all of the existing security weaknesses of the WLAN technology. Another industry initiative, driven by the leading WLAN technology vendors, have adopted a subset of the TGi work under name of WPA (Wi-Fi Protected Access) to overcome the time limitations in long standard developments, and apply changes and fixes which are immediately possible to address the most important security weaknesses of a current WLAN technology.
引用
收藏
页码:650 / 650
页数:1
相关论文
共 50 条
  • [1] Security threats and countermeasures in WLAN
    Nagamalai, D
    Dhinakaran, BC
    Sasikala, P
    Lee, SH
    Lee, JK
    TECHNOLOGIES FOR ADVANCED HETEROGENEOUS NETWORKS, PROCEEDINGS, 2005, 3837 : 168 - 182
  • [2] Assessing and improving WLAN security threats
    Nagamalai, D
    Lee, S
    Lee, W
    Lee, J
    Lee, JK
    Dhinakaran, BC
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2004, : 513 - 518
  • [3] Cloud Security Threats and Solutions: A Survey
    Butt, Umer Ahmed
    Amin, Rashid
    Mehmood, Muhammad
    Aldabbas, Hamza
    Alharbi, Mafawez T.
    Albaqami, Nasser
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (01) : 387 - 413
  • [4] Security Threats and Solutions in Cloud Computing
    Eken, Hamm
    2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 139 - 143
  • [5] A Survey on Threats and Security Solutions for IoT
    Gavra, Vlad-Dacian
    Dobra, Ionut-Marian
    Pop, Ovidiu Aurel
    2020 43RD INTERNATIONAL SPRING SEMINAR ON ELECTRONICS TECHNOLOGY (ISSE), 2020,
  • [6] A Survey of IoT Security Threats and Solutions
    Radovici, Alexandru
    Rusu, Cristian
    Serban, Razvan
    2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2018,
  • [7] Cloud Security Threats and Solutions: A Survey
    Umer Ahmed Butt
    Rashid Amin
    Muhammad Mehmood
    Hamza Aldabbas
    Mafawez T. Alharbi
    Nasser Albaqami
    Wireless Personal Communications, 2023, 128 : 387 - 413
  • [8] Virtualization: Issues, Security Threats, and Solutions
    Pearce, Michael
    Zeadally, Sherali
    Hunt, Ray
    ACM COMPUTING SURVEYS, 2013, 45 (02)
  • [9] A Review on Cloud Security Threats and Solutions
    Sebastian, Anu Maria
    Kizhakkethottam, Jubilent J.
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORKS SECURITY (ICSNS 2015), 2015,
  • [10] Personal Security on Facebook: Threats and Solutions
    Hamzah, Intan Suria
    JURNAL KOMUNIKASI-MALAYSIAN JOURNAL OF COMMUNICATION, 2021, 37 (01) : 379 - 395