Skip to main content
  • 1464 Accesses

10. Summary and Conclusions

Although Wi-Fi technologies have significantly improved their security capabilities, many of the features and abilities are available only in newer equipment for IT-managed infrastructure. Meanwhile, cellular data networks rely on a completely separate security architecture that emphasizes protection of the radio link and does not provide end-to-end encryption.

Finally, attacks have proven WEP security provided by the 802.11 standard to be insecure. The WLAN industry has responded by creating WPA and 802.11i to address these issues in the long term, though these security solutions are not available today. Most of today’s security requirements can be met with 802.1x, which provides a solution that is effective and has not yet been broken. Most wireless security vendors now offer 802.1x client and server solutions that are available today and provide security that is adequate for enterprise applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

11. References

  1. Tom Karygiannis and Les Owens, “Wireless Network Security 802.11, Bluetooth and Handheld Devices,” Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Department of Commerce, Gaithersburg, MD 20899-8930, 2002.

    Google Scholar 

  2. “Wireless Network Security,” Proxim Corporation [© 2004 Terabeam Wireless. All rights reserved. Terabeam Wireless, 8000 Lee Highway, Falls Church, VA, 22042], 2003.

    Google Scholar 

  3. George Ou, “Understanding the updated WPA and WPA2 standards,” ZDNet, Copyright © 2005 CNET Networks, Inc. All Rights Reserved. CNET Networks, Inc., 235 Second Street, San Francisco 94105 [1808 Colonial Village Lane Lancaster, PA 17601], June 2, 2005.

    Google Scholar 

  4. John R. Vacca, Firewalls: Jumpstart for Network and Systems Administrators. Digital Press, 2004.

    Google Scholar 

  5. John R. Vacca, Net Privacy: A Guide to Developing and Implementing an Ironclad ebusiness Privacy Plan. McGraw-Hill, 2001.

    Google Scholar 

  6. “Wireless Security Blackpaper,” Copyright © 1998–2005 Ars Technica, LLC, Ars Technica, LLC, 45B West Wilmot Street, Suite 203, Richmond Hill, ON L4B 2P3, Canada, 2005.

    Google Scholar 

  7. Yan Liu, “Wireless Transport Layer Security,” Department of Computer Science, 14 MacLean Hall, Iowa City, IA 52242-1419, 2005.

    Google Scholar 

  8. George Ou, “Gartner Issues False Alarm On Microsoft WPA2 Warning,” ZDNet, Copyright ©2005 CNET Networks, Inc. All Rights Reserved. CNET Networks, Inc., 235 Second Street, San Francisco 94105 [1808 Colonial Village Lane Lancaster, PA 17601], May 27, 2005.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

(2006). Standards. In: Guide to Wireless Network Security. Springer, Boston, MA . https://doi.org/10.1007/978-0-387-29845-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-29845-0_3

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-95425-7

  • Online ISBN: 978-0-387-29845-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics