WLAN security threats & solutions

被引:0
|
作者
Majstor, F [1 ]
机构
[1] Cisco Syst, Brussels, Belgium
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This session will give an overview of the latest security trends in the 802.11 based WLAN technology. WLAN technology in security terms had a hard start with early discovery of multiple weaknesses built into it by the design, or discovered afterwards by the inappropriate use of the crypto technology. Initial development of the WEP (Wire Equivalent Privacy) protocol had missed to address the key exchange mechanism as well as individual user authentication. On top of that it does not provide either crypto integrity checking mechanism or replay protection. Immediately after their discovery and public announcements most of the mentioned weaknesses also got publicly available tools on the Internet for their testing and unfortunately, also possible abuse. There are currently two solution paths in industry for securing the WLAN technology. IEEE and IETF standardization bodies have already developed and proposed multiple protocols such as 802.1x and multiple new EAP's (Extended Authentication Protocol) to address security weaknesses in the user authentication and the lack of a key management. The IEEE TGi (Task Group i) is working on a comprehensive solution within the 802.11i standard to address all of the existing security weaknesses of the WLAN technology. Another industry initiative, driven by the leading WLAN technology vendors, have adopted a subset of the TGi work under name of WPA (Wi-Fi Protected Access) to overcome the time limitations in long standard developments, and apply changes and fixes which are immediately possible to address the most important security weaknesses of a current WLAN technology.
引用
收藏
页码:650 / 650
页数:1
相关论文
共 50 条
  • [41] A survey on security challenges in cloud computing: issues, threats, and solutions
    Tabrizchi, Hamed
    Kuchaki Rafsanjani, Marjan
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (12): : 9493 - 9532
  • [42] Bitcoin Concepts, Threats, and Machine-Learning Security Solutions
    Rahouti, Mohamed
    Xiong, Kaiqi
    Ghani, Nasir
    IEEE ACCESS, 2018, 6 : 67189 - 67205
  • [43] ASSESSING THE SERVICES, SECURITY THREATS, CHALLENGES AND SOLUTIONS IN THE INTERNET OF THINGS
    Zahra, Syed Rameem
    Chishti, Mohammad Ahsan
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (03): : 457 - 484
  • [44] A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
    Aslan, Omer
    Aktug, Semih Serkant
    Ozkan-Okay, Merve
    Yilmaz, Abdullah Asim
    Akin, Erdal
    ELECTRONICS, 2023, 12 (06)
  • [45] Mobile Multimedia Broadcasting Vulnerability Threats, Attacks and Security Solutions
    Sher, Muhammad
    Magedanz, Thomas
    MWCN 07: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2007, : 56 - 60
  • [46] CLOUD COMPUTING OVERVIEW, SECURITY THREATS AND SOLUTIONS-A SURVEY
    VasanthaAzhagu, A. Kannaki
    Gnanasekar, J. M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [47] Security threats and legal issues related to Cloud based solutions
    Alsolami, Eesa
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (05): : 156 - 163
  • [48] Turkey's Security: New Threats, Indigenous Solutions, and Overseas Stretch
    Tezcan, Neslihan
    INSIGHT TURKEY, 2022, 24 (03) : 263 - 265
  • [49] Security threats and solutions in MANETs: A case study using AODV and SAODV
    von Mulert, Jan
    Welch, Ian
    Seah, Winston K. G.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (04) : 1249 - 1259
  • [50] A comprehensive review of security threats and solutions for the online social networks industry
    Nawaz, Naeem A.
    Ishaq, Kashif
    Farooq, Uzma
    Khalil, Amna
    Rasheed, Saim
    Abid, Adnan
    Rosdi, Fadhilah
    PEERJ COMPUTER SCIENCE, 2023, 9