Proceedings of the 1st Annual Conference on Information Security Curriculum Development 2004
DOI: 10.1145/1059524.1059541
|View full text |Cite
|
Sign up to set email alerts
|

Wireless security techniques

Abstract: This paper provides a survey of the different techniques that can be used to strengthen security in wireless local area networks (WLANs). The first generation of WLANs were deployed by small businesses and individuals at homes. The second generation of WLAN products are more secure than those of the first generation. Second generation broadband wireless networks are considered to be enterprise-level networks providing more capacity and coverage than first generation home-and small business-based WLANs. However… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…Besides standard and conventional methods of security services to users some of the other effective ways to secure WLANs are as follows [13]:…”
Section: Alternative Approachesmentioning
confidence: 99%
“…Besides standard and conventional methods of security services to users some of the other effective ways to secure WLANs are as follows [13]:…”
Section: Alternative Approachesmentioning
confidence: 99%
“…One or more wireless Access Points (AP), a Wireless Policy Zone Controller (WPZCon) and a Local Role Server (LRS) separated from other zones by a zone router together comprises a Wireless Policy Zone. The authentication of the users and the access points are managed by a special authentication server (AS) called Central Authentication & Role Server (CARS) which can be a RADIUS or an AAA server [11]. It also assigns appropriate roles to the authenticated users based on user credentials and policy zone (location) information.…”
Section: Basic Architecturementioning
confidence: 99%
“…In this paper, we propose a wireless security policy management framework supported by a spatio-temporal RBAC model and a SAT based verification. The novelty of the work lies in • The use of mobile IP to model the wireless nodes increases the performance of the system and gives better results compared to MAC based models as referred in [11] and [14].…”
Section: Introductionmentioning
confidence: 99%
“…The authentication of the users and the access points are managed by a special authentication server (AS) called Central Authentication & Role Server (CARS) which can be a RADIUS or an AAA server [16]. It also assigns appropriate roles to the authenticated users based on user credentials and policy zone (location) information.…”
Section: Wlan Security Policy Management Systemmentioning
confidence: 99%