Abstract
The explosive growth in the deployment of WLAN has ignited a serious concern of the WLAN security. The WLAN security is facing a series of challenges, such as the broadcast nature of wireless channels, user mobility, the heterogeneity of terminal devices, and the integration of WLAN with other networks. In this chapter, a study of WLAN security architecture is developed. Firstly, an overview of security attacks and requirements in WLAN is given. Then, a WLAN security architecture based on management is presented, which consists of three management layer: mobile terminal security platform, integrated WLAN access management platform, and WLAN security management platform. The existing WLAN security access architectures, i.e. Wep, 802.1x, WPA, 802.1 li, WAPI, and others are continued. Finally, to cope with the heterogeneity of security solutions, the integrated security authentication architecture for mobile terminals is proposed. Its feasibility is verified through realizing the software system.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
Ahmed M, Naamany A, Shidhani A, et al. IEE 802.11 wireless LAN security overview. Seoul: IJCSNS, 2006.
LAN/MAN Standards Committee of the IEEE Computer Society. Wireless LAN medium access control and physical layer specification. ANSI/IEEE Std IEEE 802.11, 2007.
SourceForge. WEPCRACK Software 2008. http://www.sourceforge.net/projects/wepcrack.
Wireless LAN Tool. AirSnort Software Tools http://airsnort.shmoo.com.
Ethereal. Ethereal Software Tools. http://www.ethereal.com.
KISMET Software Tools. http://www.kismetwireless.net.
Chen JC, Jiang MC, Liu YW. Wireless LAN security and IEEE 802.1li. IEEE wireless communications 2005(2): 27–36.
Abraham S. IEEE 802.11 TGs simple efficient extensible mesh proposal IEEE 802.11. 05/0562r2 http://www.802wirelessworld.com/.
Walker J. IEEE 802.11 security series part II: The temporal keyintegrity protocol Intel Corp. http://www.intel.com/cd/ids/developer/asmona/eng/technologies/security/topics/19181.htm.
Duan N. Research on integrated security protocols access technologies based on IEEE 802.11b adapter. Xi’an: School of Computer, Xidian University, 2006
Buttyan L, Hubaux J-P. Security and cooperation in wireless networks. Cambridge University Press, 2007.
IEEE Computer Society. IEEE 802.1X-2004, IEEE standard for local and metropolitan area networks Part 1X: port-based network access control. New York: IEEE, 2004.
Aboba B, Blunk L, Vollbrecht J et al. Extensible authentication protocol (EAP), RFC 3748, 2004.
Walker J. IEEE 802.11 security series part II: The temporal key integrity protocol, Intel Corporation, 2002.
Nancy CW, Russ H, David W, et al. Security flaws in 802.11 data link protocols. Communications of the ACM, 2003.
Stubblebine SG, Gligor VD. On message integrity in cryptographic protocols. Proc. IEEE Symposium on Research in Security and Privacy, 1992: 85–105, 1992.
Moen V, Raddum H, Hole KJ. Weaknesses in the temporal key hash of WPA. Mobile Computing and Communications Review, 2004: 76–83.
AirCrack. http://www.grape-info.com/doc/linux/config/aircrack-2.3.html.
coWPAtty. http://www.wirelessdefence.org/Contents/coWPAttyMain.htm.
Mantin I. Analysis of the stream cipher RC4 Weizmann Institute of Science, 2001.
National Institute of Standards and Technology., FIPS Pub 113: computer data authentication, 1985.
People’s Republic of China national standards. GB 15629.11–2003 Part 11: Wireless LAN medium access control and physical layer specifications. Standard Press of China, 2003.
People’s Republic of China national standards. GB 15629.1102–2003 Part 11: Wireless LAN medium access control and physical layer specifications. Standards Press of China, 2004.
Macnally C. Cisco LEAP protocol description http://www.missl.cs.umd.edu/wireless/ethereal/leap.txt.
Cisco. Wireless LAN security white Paper. http://www.cisco.com/warp/public/707/ciscosn-200308002-leap.shtml, 2003.
Cisco Networks, Cisco Aironet Response to University of Maryland’s paper, http://www.cisco.com/warp/public/cc/pd/witc/ao350ap/prodlit/1680_ pp.pdf, 2002.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2009 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Ma, J., Wang, C., Ma, Z. (2009). Security Architecture Framework. In: Security Access in Wireless Local Area Networks. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00941-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-00941-9_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00940-2
Online ISBN: 978-3-642-00941-9