Recent Development in WLAN Security

Recent Development in WLAN Security

Göran Pulkkis (Arcada Polytechnic, Finland), Kaj J. Grahn (Arcada Polytechnic, Finland), Jonny Karlsson (Arcada Polytechnic, Finland), Mikko Martikainen (Arcada Polytechnic, Finland) and Daniel E. Daniel (Escuela Universitaria Politecnica de Teruel, Spain)
DOI: 10.4018/978-1-59140-570-2.ch010
OnDemand PDF Download:


This chapter is a topical overview of wireless local area network security evolution. WLAN security threats are surveyed. Covered standards include 802.11/WEP, 802.1X/EAP, 802.11i/WPA and 802.11i/WPA2. Special attention is given to user authentication schemes and to protection of data communication. WPA is also compared with the present WLAN security protocol WEP. Other covered issues are available WPA supported technology and open source WLAN security software. A WPA secured WLAN test network is described and tested. A WLAN designed according to the new security standards is a real alternative to a secure enterprise LAN and also a reliable platform for e-commerce. Finally, WLAN security management and current research related to WLAN security are surveyed.

Complete Chapter List

Search this Book:
Table of Contents
Margherita Pagani
Chapter 1
Margherita Pagani
Nearly every incumbent operator in the wireless market has experienced business problems in recent years. The reason for this is the opening of the... Sample PDF
3G Wireless Market Attractiveness: Dynamic Challenges for Competitive Advantages
Chapter 2
G.K. Roberts, James B. Pick
This chapter identifies the technology and non-technology factors that companies consider important in deciding to adopt and deploy wireless devices... Sample PDF
Corporate Adoption of Mobile Cell Phone: Business Opportunities for 3G and Beyond
Chapter 3
Elizabeth Fife, Francis Pereira
The evaporation of dramatic growth forecasts for mobile data services highlights the need for greater understanding of user’s behavior, needs and... Sample PDF
Adoption of Mobile Data Services: Towards a Framework for Sector Analysis
Chapter 4
Phillip Olla
This chapter will describe how space technologies can be incorporated into terrestrial 3G /4G mobile telecommunication infrastructure to provide... Sample PDF
Incorporating Commercial Space Technology into Mobile Services: Developing Innovative Business Models
Chapter 5
Holtjona Galanxhi-Janaqi, Fiona F.H. Nah
Ubiquitous commerce, also referred to as “u-commerce” or “über-commerce”, is the combination of electronic, wireless/mobile, television, voice, and... Sample PDF
Ubiquitous Commerce: Beyond Wireless Commerce
Chapter 6
Bardo Fraunholz, Chandana Unnithan, Jürgen Jung
With dynamic growth and acceptance of mobile devices, many innovative business applications are beginning to emerge. Tracking and tracing seems to... Sample PDF
Tracking and Tracing Applications of 3G for SMEs
Chapter 7
Spiros Louvros, Athanassios C. Iossifides
In this chapter, a multi-layer ATM architecture is proposed for the interconnection of current and future mobile communications nodes. Consisting of... Sample PDF
Next Generation Cellular Network Planning: Transmission Issues and Proposals
Chapter 8
John Schormans, Chi M. Leung
New business opportunities for mobile, wireless, and fixed networks are going to require managed packet based services; this requires SLAs that... Sample PDF
Packet Level Performance Measurement Schemas and Their Limitations
Chapter 9
Claus Dietze
This chapter gives an introduction into the smart card technology and its history by outlining the role of the smart card in mobile communications... Sample PDF
The Smart Card in Mobile Communications: Enabler of Next-Generation (NG) Services
Chapter 10
Göran Pulkkis, Kaj J. Grahn, Jonny Karlsson, Mikko Martikainen, Daniel E. Daniel
This chapter is a topical overview of wireless local area network security evolution. WLAN security threats are surveyed. Covered standards include... Sample PDF
Recent Development in WLAN Security
Chapter 11
Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Angelo Corallo, Gianluca Elia
Mobile systems and applications are raising some important information security and privacy issues. This chapter discusses the need for privacy and... Sample PDF
Security, Privacy, and Trust in Mobile Systems and Applications
Chapter 12
Ioannis P. Chochliouros, Anastasia S. Spiliopoulou-Chochliourou
Mobile communications are fundamental to business operations, individual lifestyles and the welfare of the European economy. The proposed work aims... Sample PDF
Visions for the Completion of the European Successful Migration to 3G Systems and Services: Current and Future Options for Technology Evolution, Business Opportunities, Market Development, and Regulate
About the Authors