Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Certification Authority (CA)

Handbook of Research on Wireless Security
An entity that issues digital certificates (especially X.509 certificates) and vouches for the binding between the data items in a certificate.
Published in Chapter:
Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANs)
Giorgos Kostopoulos (University of Patras, Greece), Nicolas Sklavos (Technological Educational Institute of Mesolonghi, Greece), and Odysseas Koufopavlou (University of Patras, Greece)
Copyright: © 2008 |Pages: 15
DOI: 10.4018/978-1-59904-899-4.ch046
Abstract
Wireless communications are becoming ubiquitous in homes, offices, and enterprises with the popular IEEE 802.11 wireless local area network (LAN) technology and the up-and-coming IEEE 802.16 wireless metropolitan area networks (MAN) technology. The wireless nature of communications defined in these standards makes it possible for an attacker to snoop on confidential communications or modify them to gain access to home or enterprise networks much more easily than with wired networks. Wireless devices generally try to reduce computation overhead to conserve power and communication overhead to conserve spectrum and battery power. Due to these considerations, the original security designs in wireless LANs and MANs used smaller keys, weak message integrity protocols, weak or one-way authentication protocols, and so forth. As wireless networks became popular, the security threats were also highlighted to caution users. A security protocol redesign followed first in wireless LANs and then in wireless MANs. This chapter discusses the security threats and requirements in wireless LANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols. It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues. Our aim is to provide the reader with a single source of information on security threats and requirements, authentication technologies, security encapsulation, and key management protocols relevant to wireless LANs and MANs.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Survey of Key Management in Mobile Ad Hoc Networks
A trusted third party in an asymmetric cryptosystem that vouches for the binding of the public key with an identity.
Full Text Chapter Download: US $37.50 Add to Cart
E-Business Systems Security in Intelligent Organizations
An authority trusted by one or more users to create and assign public key certificates.
Full Text Chapter Download: US $37.50 Add to Cart
Federal Public-Key Infrastructure
An authority trusted by one or more users to create and assign certificates.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR