Chapter 6Wireless Network Security
Wireless computer networks are playing a major role in modern communications. Laptop computers, cell phones, and embedded systems in common appliances and automobiles may be connected to form an ad hoc network or to a fixed network infrastructure such as the Internet through wireless access points. Wireless access points have been installed in office buildings, homes, airports, hotels, highway service stations, and other facilities, providing people with unprecedented conveniences and flexibilities to exchange information and enjoy online entertainment. People today, for example, can connect their laptop computers to the Internet while sitting in their own backyards or while waiting for flights in the airports. Wireless computer networks have started a new revolution in the information industry.
This chapter introduces the IEEE 802.11 wireless network standard for wireless local area networks (WLANs), wireless network security vulnerabilities, and common wireless security protocols. The latter includes the Wired Equivalent Privacy (WEP) protocol, the Wi-Fi Protected Access (WPA) protocol, WPA2, the IEEE 802.11i protocol, and the IEEE 802.1X authentication protocol. This chapter also introduces the Bluetooth protocol and the ZigBee protocol for wireless personal area networks (WPANs) and their security mechanisms. Finally, it introduces several security issues in wireless mesh networks (WMNs).
6.1 Wireless Communications and 802.11 WLAN Standards ...
Get Introduction to Network Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.