Secure Roaming in 802.11 Networks

Book description

Secure Roaming in 802.11 Networks offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques. The book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. It helps ensure secure and constant connectivity of laptops, PDAs and other emerging mobile devices.

Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when we’re mobile and using 802.11 WLANs. However, 802.11 was not originally designed with roaming capabilities and can’t, in its "pure" form, support seamless roaming between different hotspots and other 802.11 access points. This book details the theory behind various 802.11 extensions to permit roaming and describes how these extensions can be successfully implemented in 802.11 WLANs. It reviews coverage of user authentication in 802.11, as well as roaming between 802.11 and other wireless technologies. It also discusses wireless technologies and application programming interfaces.

This book will appeal to RF/wireless engineers and designers, computer/data network engineers, and graduate students.

* Offers a comprehensive treatise on Wi-Fi 802.11 roaming by comparing/contrasting it to cellular roaming theory and techniques
* Emerges as a "one stop" resource for design engineers charged with fulfilling the market need for seamless 802.11 device roaming capabilities
* Builds upon the knowledge base of a professional audience without delving into long discussions of theory long since mastered

Table of contents

  1. Front Cover
  2. Secure Roaming In 802.11 Networks
  3. Copyright Page
  4. Table of Contents (1/2)
  5. Table of Contents (2/2)
  6. Preface
  7. Acknowledgments
  8. About the Authors
  9. Chapter 1. Introduction
    1. 1.1 Introduction
    2. 1.2 Basic Networking Terminology and Conventions
    3. 1.3 Setting the Scene
    4. 1.4 Different Notions of Roaming
    5. 1.5 Big Cells, Little Cells
    6. 1.6 Authentication, Authorization, Accounting, and Roaming
    7. 1.7 How Fast Do We Roam on the Range?
    8. 1.8 Taxonomy for Roaming (1/2)
    9. 1.8 Taxonomy for Roaming (2/2)
    10. 1.9 Organization of the Book
  10. Chapter 2. Cellular Telephony: Wireless Roaming Pioneers
    1. 2.1 Introduction
    2. 2.2 The Future of Computing
    3. 2.3 Basic Concepts
    4. 2.4 Early History of Radio Telephony (1/2)
    5. 2.4 Early History of Radio Telephony (2/2)
    6. 2.5 The Digital Revolution (1/2)
    7. 2.5 The Digital Revolution (2/2)
    8. 2.6 Soft Versus Hard Handoffs in Various Cellular Technologies
    9. 2.7 The Quest for Convergence (1/2)
    10. 2.7 The Quest for Convergence (2/2)
    11. 2.8 Summary
  11. Chapter 3. Roaming in 802.11 WLANs:General Principles
    1. 3.1 Introduction
    2. 3.2 Primer on the 802.11 Standard (1/3)
    3. 3.2 Primer on the 802.11 Standard (2/3)
    4. 3.2 Primer on the 802.11 Standard (3/3)
    5. 3.3 Introduction to 802.11 Roaming (1/2)
    6. 3.3 Introduction to 802.11 Roaming (2/2)
    7. 3.4 Local Roaming
    8. 3.5 Global Roaming
    9. 3.6 Mobile IP and Its Role in 802.11 Roaming
    10. 3.7 Those Pesky Laws of Physics
  12. Chapter 4. Dynamics of 802.11 Task Groups
    1. 4.1 Introduction
    2. 4.2 Evolution of an IEEE Standard
    3. 4.3 Battle for Speed, Cost, and Market Dominance
    4. 4.4 The 802.11 Standard’s Physical Layer
    5. 4.5 Fast Secure Roaming Task Groups
    6. 4.6 802.11i Security
    7. 4.7 802.11e Quality of Service
    8. 4.8 802.11k Radio Resource Measurement Enhancements
    9. 4.9 802.11r Roaming
    10. 4.10 Other 802.11 Subgroups
    11. 4.11 Wi-Fi Alliance Versus IEEE 802.11
  13. Chapter 5. Practical Aspects of Basic 802.11 Roaming
    1. 5.1 Introduction
    2. 5.2 The Driver and Client in an 802.11 Station (1/4)
    3. 5.2 The Driver and Client in an 802.11 Station (2/4)
    4. 5.2 The Driver and Client in an 802.11 Station (3/4)
    5. 5.2 The Driver and Client in an 802.11 Station (4/4)
    6. 5.3 Detailed Analyses of Real-Life Roams
    7. 5.4 Dissection of a Global Roam
    8. 5.5 Dissection of a Local Roam
    9. 5.6 Access-Point Placement Methodologies
  14. Chapter 6. Fundamentals of User Authentication in 802.11
    1. 6.1 Introduction
    2. 6.2 802.1X Port-Level Authentication
    3. 6.3 The AAA Server
    4. 6.4 The Extensible Authentication Protocol (1/2)
    5. 6.4 The Extensible Authentication Protocol (2/2)
    6. 6.5 Flexible and Strong Authentication in 802.11
    7. 6.6 Other 802.11 Authentication Methodologies
    8. 6.7 Network Access Control
    9. 6.8 Summary
  15. Chapter 7. Roaming Securely in 802.11
    1. 7.1 Introduction
    2. 7.2 The 802.11 Security Staircase
    3. 7.3 Preauthentication in 802.11i
    4. 7.4 Detailed Analysis of Real-Life Secured Roams
    5. 7.5 Dissection of a WPA-PSK Protected Roam
    6. 7.6 Dissection of a WPA2 Enterprise Roam (1/2)
    7. 7.6 Dissection of a WPA2 Enterprise Roam (2/2)
    8. 7.7 Dissection of an 802.11i Preauthentication (1/2)
    9. 7.7 Dissection of an 802.11i Preauthentication (2/2)
    10. 7.8 Summary
  16. Chapter 8. Optimizing Beyond the 802.11 Standard
    1. 8.1 Introduction
    2. 8.2 Voice over Wireless IP Roaming (1/2)
    3. 8.2 Voice over Wireless IP Roaming (2/2)
    4. 8.3 Opportunistic Key Caching
    5. 8.4 Centralized Wireless Switch Architectures (1/2)
    6. 8.4 Centralized Wireless Switch Architectures (2/2)
  17. Chapter 9. The 802.11 Workgroups’ Solutions for Fast Secure Roaming
    1. 9.1 Introduction
    2. 9.2 Overview of the 802.11r Standard
    3. 9.3 Detailed Concepts and Terminology of 802.11r (1/3)
    4. 9.3 Detailed Concepts and Terminology of 802.11r (2/3)
    5. 9.3 Detailed Concepts and Terminology of 802.11r (3/3)
    6. 9.4 Protocol Exchanges in 802.11r (1/2)
    7. 9.4 Protocol Exchanges in 802.11r (2/2)
    8. 9.5 The 802.11k Standard Applied to Roaming (1/2)
    9. 9.5 The 802.11k Standard Applied to Roaming (2/2)
    10. 9.6 Concluding Remarks
  18. Chapter 10. Roaming between 802.11 and Other Wireless Technologies
    1. 10.1 Introduction
    2. 10.2 Ideal Roaming Experience
    3. 10.3 IEEE 802.16: WiMAX
    4. 10.4 IEEE 802.15.1: Bluetooth
    5. 10.5 Relevant Standards Bodies and Industry Organizations
    6. 10.6 Third Generation Partnership Program (1/2)
    7. 10.6 Third Generation Partnership Program (2/2)
    8. 10.7 UMA: A Transitional Step for 3GPP
    9. 10.8 Third Generation Partnership Program 2
    10. 10.9 The 802.21 Standard
    11. 10.10 Summary
  19. Chapter 11. Future Directions
    1. 11.1 Introduction
    2. 11.2 Survey of Ongoing Work Related to 802.11 (1/2)
    3. 11.2 Survey of Ongoing Work Related to 802.11 (2/2)
    4. 11.3 A Mobility Model for Studying Wireless Communication
    5. 11.4 Conclusions
  20. Appendix A. Acronyms and Abbreviations (1/3)
  21. Appendix A. Acronyms and Abbreviations (2/3)
  22. Appendix A. Acronyms and Abbreviations (3/3)
  23. Appendix B. List of Figures
  24. Appendix C. List of Tables
  25. Index (1/3)
  26. Index (2/3)
  27. Index (3/3)

Product information

  • Title: Secure Roaming in 802.11 Networks
  • Author(s): Paul Goransson, Raymond Greenlaw
  • Release date: April 2011
  • Publisher(s): Newnes
  • ISBN: 9780080548944