Literature Review
Abstract
The chapter is about 802.11x families specifically about 802.11i and the meaning of encryption in 802.11i; the key generation technique in 802.11i construction is defined, which begins with authentication and authorization employed with authentication server (AS) and petitioner to extract the Pairwise Master Key (PMK). 802.11i protocol creates random key suitable AES-CCMP framework that is defined in this chapter. It also presents a sorting of encryption protocols in 802.11i. It pertains to the issues of these protocols in computer and mobile devices Moreover, it clarifies the existing protocols being used for encryption of 802.11i Standard. Also the main computers and mobile devices are identified.
Get Optimizing IEEE 802.11i Resource and Security Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.