WLAN security threats & solutions

被引:0
|
作者
Majstor, F [1 ]
机构
[1] Cisco Syst, Brussels, Belgium
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This session will give an overview of the latest security trends in the 802.11 based WLAN technology. WLAN technology in security terms had a hard start with early discovery of multiple weaknesses built into it by the design, or discovered afterwards by the inappropriate use of the crypto technology. Initial development of the WEP (Wire Equivalent Privacy) protocol had missed to address the key exchange mechanism as well as individual user authentication. On top of that it does not provide either crypto integrity checking mechanism or replay protection. Immediately after their discovery and public announcements most of the mentioned weaknesses also got publicly available tools on the Internet for their testing and unfortunately, also possible abuse. There are currently two solution paths in industry for securing the WLAN technology. IEEE and IETF standardization bodies have already developed and proposed multiple protocols such as 802.1x and multiple new EAP's (Extended Authentication Protocol) to address security weaknesses in the user authentication and the lack of a key management. The IEEE TGi (Task Group i) is working on a comprehensive solution within the 802.11i standard to address all of the existing security weaknesses of the WLAN technology. Another industry initiative, driven by the leading WLAN technology vendors, have adopted a subset of the TGi work under name of WPA (Wi-Fi Protected Access) to overcome the time limitations in long standard developments, and apply changes and fixes which are immediately possible to address the most important security weaknesses of a current WLAN technology.
引用
收藏
页码:650 / 650
页数:1
相关论文
共 50 条
  • [31] A Review of Security Threats, Solutions and Trust Management in VANETs
    Premasudha, B. G.
    Ram, V. Ravi
    Miller, J.
    Suma, R.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (01): : 38 - 57
  • [32] An Overview of Security Threats, Solutions and Challenges in WBANs for Healthcare
    Mucchi, Lorenzo
    Jayousi, Sara
    Martinelli, Alessio
    Caputo, Stefano
    Marcocci, Patrizio
    2019 13TH INTERNATIONAL SYMPOSIUM ON MEDICAL INFORMATION AND COMMUNICATION TECHNOLOGY (ISMICT), 2019, : 151 - 156
  • [33] Security of IoT Application Layer: Requirements, Threats, and Solutions
    Abbasi, Mahmoud
    Plaza-Hernandez, Marta
    Mezquita, Yeray
    AMBIENT INTELLIGENCE-SOFTWARE AND APPLICATIONS-13TH INTERNATIONAL SYMPOSIUM ON AMBIENT INTELLIGENCE, 2023, 603 : 86 - 100
  • [34] A survey on security challenges in cloud computing: issues, threats, and solutions
    Hamed Tabrizchi
    Marjan Kuchaki Rafsanjani
    The Journal of Supercomputing, 2020, 76 : 9493 - 9532
  • [35] Cyber-security on smart grid: Threats and potential solutions
    Gunduz, Muhammed Zekeriya
    Das, Resul
    COMPUTER NETWORKS, 2020, 169 (169)
  • [36] A review of threats, protocols, and solutions to enhance the security of wireless networks
    Ataelmanan, Somya Khidir Mohmmed
    Al Hassan, Mostafa Ahmed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (04): : 108 - 115
  • [37] Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions
    Abbasi, Mahmoud
    Plaza-Hernandez, Marta
    Prieto, Javier
    Corchado, Juan M.
    IEEE ACCESS, 2022, 10 : 97197 - 97216
  • [38] An Analysis of Smart Contracts Security Threats Alongside Existing Solutions
    Vivar, Antonio Lopez
    Castedo, Alberto Turegano
    Orozco, Ana Lucila Sandoval
    Villalba, Luis Javier Garcia
    ENTROPY, 2020, 22 (02)
  • [39] Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
    Essa, Areej
    Al-Shoura, Tariq
    Al Nabulsi, Ahmad
    Al-Ali, A. R.
    Aloul, Fadi
    2018 2ND INTERNATIONAL CONFERENCE ON SMART GRID AND SMART CITIES (ICSGSC 2018), 2018, : 62 - 67
  • [40] Energy & National Security: An Exploration of Threats, Solutions, and Alternative Futures
    Triola, Larry C.
    2008 IEEE ENERGY 2030 CONFERENCE, 2008, : 367 - 413