The IEEE 802.11 standard is becoming the most popular and efficient network topology deployed today. Providing and ensuring the security of wireless network is essential part to its continuous growth. Goals such as confidentiality and trust imply that every data transmitted by each user stays known only to the communicating parties. Authorization of users is also a very important aspect of network integrity. There exist mechanisms defined by the Wi-Fi Protected Access (WPA) protocol that enable such functionality; however, recent attacks on such system showed that these mechanisms can be defied. In this Book, we propose two new security schemes. The first employs a neural network decision engine that restricts network access to mobile nodes whose physical location is within a threshold distance from the wireless access point or the controller of the network. The second tackles the disassociation packet security flaw by which a malicious attacker can disconnect all network users by injecting two or more false management frames into the network. Our scheme proposes the use of digital signatures as a mean to ensure the authenticity, integrity and validity of these frames.
Security Enhancement Schemes for Wireless Networks: Deploying Neural Nets and Digital Signatures
- Authors
- Tarik Guelzim
- ISBN
- 3639171284
- Published
- 03 Jul 2009
- Purchase online
- amazon.com
The IEEE 802.11 standard is becoming the most popular and efficient network topology deployed today. Providing and ensuring the security of wireless network is essential part to its continuous growth. Goals such as confidentiality and trust imply that every data transmitted by each user stays known only to the communicating parties. Authorization of users is also a very important aspect of network integrity.
Editorial Reviews
You might also like...
Security tutorials
- What You Need to Know about PCI Compliance and Web Application Security Policy Changes
- Effective Controls for Attaining Continuous Application Security Throughout the Web Application Development Life Cycle
- Top 10 Application Security Vulnerabilities in Web.config Files - Part Two
- Testing for Security in the Age of Ajax Programming
Security books
-
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001 (Comptia Study Guide)
Brand-new security certification insight from an industry expertTargeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study gui...
Security podcasts
-
IBM developerWorks: TWOdW: Save data energy and pull down old silos
Published 8 years ago, running time 0h2m
Last month, we highlighted a demo on how to integrate reverse-proxy WebSEAL (found in the IBM Security Access Manager solution) with the SAP NetWeaver Application Server ABAP. Now developerWorks has provided a wrapper of resources around the video to help you identify opportunities to learn more
Comments