3. Authentication
In a wireless network environment, authentication is one of the most critical services. For an operator, the challenge is to prevent fraudsters from connecting to the network, and to protect legitimate subscribers from identity theft. For a private network, the challenge is to prevent third-party access to corporate applications, and in particular the theft of confidential information, industrial secrets...
Authentication solutions for 802.11 networks have evolved considerably over the last ten years. Initially, the standard provided for free access to the access point (without authentication), or authenticated access using a pre-shared key (PSK). These two historical access solutions are presented in 3.1
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Authentication
Bibliography
Websites
Club de la Sécurité de l'Information Français, IT threats and security practices in France, 2008 Edition https://clusif.fr/publications/menaces-informatiques-pratiques-de-securite-france-edition-2018-rapport/ (page consulted on December 23, 2009)
Standards and norms
- IEEE p. 802.11s/d2.06 : Part 11 : Wireless LAN MAC and physical layer specifications, amendment 10 : Mesh networking. IEEE draft - IEEE 802.11s TG - 01-09
- IEEE std. 802.11-2007 (revision of IEEE std. 802.11-1999) : Part 11 : Wireless LAN MAC and physical layer specifications. IEEE standard - IEEE 802.11 TG - 06-07
- IEEE std. 802.1x-2004 : Port based network access control. IEEE standard - IEEE 802.1X TG...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference