Skip to Content
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
book

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

by Jon Edney, William A. Arbaugh
July 2003
Intermediate to advanced content levelIntermediate to advanced
480 pages
12h 4m
English
Addison-Wesley Professional
Content preview from Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Chapter 13. Wi-Fi LAN Coordination: ESS and IBSS

Chapter 13 covers a range of topics. We look at the process by which a mobile device is able to find an access point and join the network. This leads to a discussion on how the mobile device and access point ensure they have compatible security properties and how a mobile device might be able to roam from one access point to another which incurring a large delay due to the authentication process.

In the second half of the chapter, we revisit the IBSS or ad-hoc style of network. Such networks do not use access points and present extra problems for security implementation. In this chapter we look at the solution proposed by the IEEE 802.11i standards group.

Network Coordination

A Wi-Fi LAN needs to be ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN

CCNA Lee Barken - CISSP MCP CPA
Enterprise Java™ Security: Building Secure J2EE™ Applications

Enterprise Java™ Security: Building Secure J2EE™ Applications

Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
Wireshark for Wireless LANs

Wireshark for Wireless LANs

Jerome Henry / James Garringer

Publisher Resources

ISBN: 0321136209Purchase book