Skip to Main Content
Wireless Security: Know It All
book

Wireless Security: Know It All

by Praphul Chandra, Frank Thornton, Chris Lanthem, Jon S. Wilson, Dan Bensky, Tony Bradley, Chris Hurley, Steve A. Rackley, John Rittinghouse PhD CISM, James F. Ransome PhD CISM CISSP, Timothy Stapko, George L Stefanek
April 2011
Intermediate to advanced content levelIntermediate to advanced
744 pages
21h 41m
English
Newnes
Content preview from Wireless Security: Know It All

Chapter 18. Wireless LAN Security

18.1. Introduction

The 802.11 security architecture and protocol is called Wired Equivalent Privacy (WEP). It is responsible for providing authentication, confidentiality and data integrity in 802.11 networks. To understand the nomenclature, realize that 802.11 was designed as a “wireless Ethernet.” The aim of the WEP designers was therefore to provide the same degree of security as is available in traditional wired (Ethernet) networks. Did they succeed in achieving this goal?

A few years back, asking that question in the wireless community was a sure-fire way of starting a huge debate. To understand the debate, realize that wired Ethernet[1] (the IEEE 802.3 standard) implements no security mechanism in hardware ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
802.11 Security

802.11 Security

Bob Fleck, Bruce Potter
Securing the Internet of Things

Securing the Internet of Things

Shancang Li, Li Da Xu

Publisher Resources

ISBN: 9781856175296