CHAPTER 33
802.11 WIRELESS LAN SECURITY
Gary L. Tagg
33.1.2 Background and Uses of Wireless LANs
33.2 802.11 ARCHITECTURE AND PRODUCT TYPES
33.2.2 802.11 Network Architecture
33.2.4 Wireless LAN Product Types
33.2.5 Benefits of Wireless Switch/Access Controller Architecture
33.2.6 Security Benefits of Wireless Switch/Access Controller Architecture
33.3 WIRELESS LAN SECURITY THREATS
33.3.1 Comparison between Wired and Wireless
33.3.2 Specific Threats Enabled by Wireless LANs
33.4 ORIGINAL 802.11 SECURITY FUNCTIONALITY
33.4.1 Security Functionality Overview
33.4.2 Connecting to a Wireless Network and Authentication
33.4.3 Defending against the WEP Vulnerability
33.5.1 Structure of the Robust Security Network
33.5.3 Security Association Management
33.5.4 RSNA Key Hierarchy and Management
33.5.5 Temporal Key Integrity Protocol
33.5.6 Counter Mode/CBC-MAC Protocol (CCMP)
33.5.7 Remaining Implementation Issues
33.5.8 Wi-Fi Alliance's WPA and WPA2 Standards
802.11 SECURITY AUDITING TOOLS
33.6.8 Commercial Wireless Auditing Tools
33.8 APPENDIX 33A–802.11 STANDARDS
33.8.1 802.11 and 802.11b: MAC and Physical Layer Specifications
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.