Skip to main content

Security Architecture Framework

  • Chapter
  • 262 Accesses

Abstract

The explosive growth in the deployment of WLAN has ignited a serious concern of the WLAN security. The WLAN security is facing a series of challenges, such as the broadcast nature of wireless channels, user mobility, the heterogeneity of terminal devices, and the integration of WLAN with other networks. In this chapter, a study of WLAN security architecture is developed. Firstly, an overview of security attacks and requirements in WLAN is given. Then, a WLAN security architecture based on management is presented, which consists of three management layer: mobile terminal security platform, integrated WLAN access management platform, and WLAN security management platform. The existing WLAN security access architectures, i.e. Wep, 802.1x, WPA, 802.1 li, WAPI, and others are continued. Finally, to cope with the heterogeneity of security solutions, the integrated security authentication architecture for mobile terminals is proposed. Its feasibility is verified through realizing the software system.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahmed M, Naamany A, Shidhani A, et al. IEE 802.11 wireless LAN security overview. Seoul: IJCSNS, 2006.

    Google Scholar 

  2. LAN/MAN Standards Committee of the IEEE Computer Society. Wireless LAN medium access control and physical layer specification. ANSI/IEEE Std IEEE 802.11, 2007.

    Google Scholar 

  3. SourceForge. WEPCRACK Software 2008. http://www.sourceforge.net/projects/wepcrack.

    Google Scholar 

  4. Wireless LAN Tool. AirSnort Software Tools http://airsnort.shmoo.com.

    Google Scholar 

  5. Ethereal. Ethereal Software Tools. http://www.ethereal.com.

    Google Scholar 

  6. KISMET Software Tools. http://www.kismetwireless.net.

    Google Scholar 

  7. Chen JC, Jiang MC, Liu YW. Wireless LAN security and IEEE 802.1li. IEEE wireless communications 2005(2): 27–36.

    Google Scholar 

  8. Abraham S. IEEE 802.11 TGs simple efficient extensible mesh proposal IEEE 802.11. 05/0562r2 http://www.802wirelessworld.com/.

    Google Scholar 

  9. Walker J. IEEE 802.11 security series part II: The temporal keyintegrity protocol Intel Corp. http://www.intel.com/cd/ids/developer/asmona/eng/technologies/security/topics/19181.htm.

    Google Scholar 

  10. Duan N. Research on integrated security protocols access technologies based on IEEE 802.11b adapter. Xi’an: School of Computer, Xidian University, 2006

    Google Scholar 

  11. Buttyan L, Hubaux J-P. Security and cooperation in wireless networks. Cambridge University Press, 2007.

    Google Scholar 

  12. IEEE Computer Society. IEEE 802.1X-2004, IEEE standard for local and metropolitan area networks Part 1X: port-based network access control. New York: IEEE, 2004.

    Google Scholar 

  13. Aboba B, Blunk L, Vollbrecht J et al. Extensible authentication protocol (EAP), RFC 3748, 2004.

    Google Scholar 

  14. Walker J. IEEE 802.11 security series part II: The temporal key integrity protocol, Intel Corporation, 2002.

    Google Scholar 

  15. Nancy CW, Russ H, David W, et al. Security flaws in 802.11 data link protocols. Communications of the ACM, 2003.

    Google Scholar 

  16. Stubblebine SG, Gligor VD. On message integrity in cryptographic protocols. Proc. IEEE Symposium on Research in Security and Privacy, 1992: 85–105, 1992.

    Google Scholar 

  17. Moen V, Raddum H, Hole KJ. Weaknesses in the temporal key hash of WPA. Mobile Computing and Communications Review, 2004: 76–83.

    Google Scholar 

  18. AirCrack. http://www.grape-info.com/doc/linux/config/aircrack-2.3.html.

    Google Scholar 

  19. coWPAtty. http://www.wirelessdefence.org/Contents/coWPAttyMain.htm.

    Google Scholar 

  20. Mantin I. Analysis of the stream cipher RC4 Weizmann Institute of Science, 2001.

    Google Scholar 

  21. National Institute of Standards and Technology., FIPS Pub 113: computer data authentication, 1985.

    Google Scholar 

  22. People’s Republic of China national standards. GB 15629.11–2003 Part 11: Wireless LAN medium access control and physical layer specifications. Standard Press of China, 2003.

    Google Scholar 

  23. People’s Republic of China national standards. GB 15629.1102–2003 Part 11: Wireless LAN medium access control and physical layer specifications. Standards Press of China, 2004.

    Google Scholar 

  24. Macnally C. Cisco LEAP protocol description http://www.missl.cs.umd.edu/wireless/ethereal/leap.txt.

    Google Scholar 

  25. Cisco. Wireless LAN security white Paper. http://www.cisco.com/warp/public/707/ciscosn-200308002-leap.shtml, 2003.

    Google Scholar 

  26. Cisco Networks, Cisco Aironet Response to University of Maryland’s paper, http://www.cisco.com/warp/public/cc/pd/witc/ao350ap/prodlit/1680_ pp.pdf, 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Ma, J., Wang, C., Ma, Z. (2009). Security Architecture Framework. In: Security Access in Wireless Local Area Networks. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00941-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00941-9_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00940-2

  • Online ISBN: 978-3-642-00941-9

Publish with us

Policies and ethics