O'Reilly logo

Real 802.11 Security: Wi-Fi Protected Access and 802.11i by William A. Arbaugh, Jon Edney

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. WPA, RSN, and IEEE 802.11i

Chapter 7 introduces the new security protocols that replace WEP and provide real security. In the next few chapters we delve into details regarding how the new protocols work and are applied to real installations. In this chapter, we define the terms and explain the process under which the protocols developed. We look at the importance of keys to the solution and how the keys are used within the context of a secure system. Finally, prior to diving into detail in Chapter 8, we provide a roadmap of the many standards used in the new security solutions.

Relationship Between Wi-Fi and IEEE 802.11

The Institute of Electrical and Electronics Engineers (www.IEEE.org) operates a group called the Standards Association ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required