Flylib.com
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
ISBN: 0321136209
EAN: 2147483647
Year: 2005
Pages: 151
Authors:
Jon Edney
,
William A. Arbaugh
BUY ON AMAZON
Main Page
Table of content
Copyright
Praise for Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Preface
Why This Book Now?
Audience
Organization
Disclaimer
Acknowledgments
Part I: What Everyone Should Know
Chapter 1. Introduction
Setting the Scene
Roadmap to the Book
Notes on the Book
Chapter 2. Security Principles
What Is Security?
Good Security Thinking
Security Terms
Summary
Chapter 3. Why Is Wi-Fi Vulnerable to Attack?
Changing the Security Model
What Are the Enemies Like?
Traditional Security Architecture
Danger of Passive Monitoring
Summary
Chapter 4. Different Types of Attack
Classification of Attacks
Attacks Without Keys
Attacks on the Keys
Summary
Part II: The Design of Wi-Fi Security
Chapter 5. IEEE 802.11 Protocol Primer
Layers
Wireless LAN Organization
Basics of Operation in Infrastructure Mode
Protocol Details
Radio Bits
Summary
Chapter 6. How IEEE 802.11 WEP Works and Why It Doesn t
Introduction
Authentication
Privacy
Mechanics of WEP
Why WEP Is Not Secure
Summary
Chapter 7. WPA, RSN, and IEEE 802.11i
Relationship Between Wi-Fi and IEEE 802.11
What Is IEEE 802.11i?
What Is WPA?
Differences Between RSN and WPA
Security Context
Keys
Security Layers
Relationship of the Standards
Summary
Chapter 8. Access Control: IEEE 802.1X, EAP, and RADIUS
Importance of Access Control
Authentication for Dial-in Users
IEEE 802.1X
EAP Principles
EAPOL
Messages Used in IEEE 802.1X
Implementation Considerations
RADIUSRemote Access Dial-In User Service
Summary
Chapter 9. Upper-Layer Authentication
Introduction
Who Decides Which Authentication Method to Use?
Use of Keys in Upper-Layer Authentication
A Detailed Look at Upper-Level Authentication Methods
Transport Layer Security (TLS)
Kerberos
Cisco Light EAP (LEAP)
Protected EAP Protocol (PEAP)
Authentication in the Cellular Phone World: EAP-SIM
Summary
Chapter 10. WPA and RSN Key Hierarchy
Pairwise and Group Keys
Pairwise Key Hierarchy
Group Key Hierarchy
Key Hierarchy Using AES-CCMP
Mixed Environments
Summary of Key Hierarchies
Details of Key Derivation for WPA
Nonce Selection
Computing the Temporal Keys
Summary
Chapter 11. TKIP
What Is TKIP and Why Was It Created?
TKIP Overview
Per-Packet Key Mixing
TKIP Implementation Details
Message IntegrityMichael
Per-Packet Key Mixing
Summary
Chapter 12. AES-CCMP
Introduction
Why AES?
AES Overview
How CCMP Is Used in RSN
Summary
Chapter 13. Wi-Fi LAN Coordination: ESS and IBSS
Network Coordination
WPARSN Information Element
Preauthentication Using IEEE 802.1X
IBSS Ad-Hoc Networks
Summary
Part III: Wi-Fi Security in the Real World
Chapter 14. Public Wireless Hotspots
Development of Hotspots
Security Issues in Public Hotspots
How Hotspots Are Organized
Different Types of Hotspots
How to Protect Yourself When Using a Hotspot
Summary
Chapter 15. Known Attacks: Technical Review
Review of Basic Security Mechanisms
Review of Previous IEEE 802.11 Security Mechanisms
Attacks Against the Previous IEEE 802.11 Security Mechanisms
Man-in-the-Middle Attacks
Problems Created by Man-in-the-Middle Attacks
Denial-of-Service Attacks
Summary
Chapter 16. Actual Attack Tools
Attacker Goals
Process
Example Scenarios
Other Tools of Interest
Summary
Chapter 17. Open Source Implementation Example
General Architecture Design Guidelines
Protecting a Deployed Network
Planning to Deploy a WPA Network
Deploying the Infrastructure
Practical Example Based on Open Source Projects
Summary
Acknowledgments
References and More Information
Appendixes
Appendix A. Overview of the AES Block Cipher
Finite Field Arithmetic
Steps in the AES Encryption Process
Appendix B. Example Message Modification
Example Message Modification
Appendix C. Verifying the Integrity of Downloaded Files
Checking the MD5 Digest
Checking the GPG Signature
Acronyms
References
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
ISBN: 0321136209
EAN: 2147483647
Year: 2005
Pages: 151
Authors:
Jon Edney
,
William A. Arbaugh
BUY ON AMAZON
Software Configuration Management
Configuration Status Accounting
Configuration Management and Software Engineering Standards Reference
Appendix C Sample Data Dictionary
Appendix I System Service Request
Appendix U Acronyms and Glossary
C++ How to Program (5th Edition)
Examples Using the for Statement
Summary
Tying an Output Stream to an Input Stream
Bit Fields
L.6. Wrap-Up
The Java Tutorial: A Short Course on the Basics, 4th Edition
Using the Timer and TimerTask Classes
Getting Started Problems
Practical Consideration of Writing Applets
Interoperability
Why Is Thread.stop Deprecated?
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
VBScript Basics
Processing Collections of Data
Using Procedures to Organize Scripts
Appendix B Built-In VBScript Functions
InDesign Type: Professional Typography with Adobe InDesign CS2
Kern, Baby, Kern
Ellipses
Ordinals/Raised and Lowered Characters
Creating Default Styles
Snap to Guides
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Getting Faster to Get Better Why You Need Both Lean and Six Sigma
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
Using DMAIC to Improve Service Processes
Raising the Stakes in Service Process Improvement
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies