Security in Wireless Local Area Network (wlan)
- IT Center, University of Mazandaran, Babolsar, Iran.
- Department of IT, Shiraz University, Shiraz, Iran.
- Department of Artificial Engineering, Shiraz University, Shiraz, Iran.
Regarding increase of wireless network application, and fast development at these systems, security in such systems and networks has become a crucial matter. In this article, first different security methods of local wireless networks, as subsidiaries of wireless networks, are introduced and then the efficiency of so far introduced security methods such as WEP, WPA and WPAv2 are studied as well as their negative and positive aspects. The focus of this text is on IEEE security protocols including 802.1x and 802.11i, their functions and security levels. The privileges and shortcoming at the mentioned protocols would be discussed afterwards.
- Wireless LAN
A. Louw, A. William, Jr. Yarberry, Wireless security :here we go again , Information Strategy, (2002)
A. S. Tanenbaum, Computer Networks, Foutrh Edition, (2008)
B. Issac, L. A. Mohammed , War driving and WLAN security issues-attacks-security design and remedies, Information Systems Management, 24 (2007)
B. R. Miller, B. A. Hamilton, Issues in wireless wecurity (WEP, WPA and 802.11i), 18th Annual Computer Security Applications Conference, (2002)
B. V. Solms, E. Marais, From secure wired networks to secure wireless networks e what are the extra risks?, Computers and Security, 23 (2004), 633-637.
C. Ellison , Wireless security:WPA step by step , Pc Magazine, Special wireless issues, (2003), 47-51
D. L. Evans, Phillip J. Bond, Arden L. Bement, Wireless network security—802.11, bluetooth and handheld devices, National Institute ofStandards and Technology, USA (2002)
Elsevier, WPA cracking tool launched, Network Security, Published by Elsevier Ltd, 12 (2009), 1-2.
Internet Security Systems (ISS) group, Wireless LAN security 802.11 b and corporate networks, http://documents.iss.net/whitepapers/wireless_LAN_security.pdf, (2001)
J. Chen, M. Jiang, Y. Liu, Wireless LAN Security and IEEE802.11i, IEEE Wireless Communications, 12 (2005), 27–36.
J. Edney, W. Arbaugh, Real 802.11 Security, Addison Wesley, Reading, Massachusetts, (2004)
J. Kindervag , The five myths of wireless security, Telecomminucation and Network Security, (2006), 7-16.
J. Lei, X. Fu, D. Hogrefe, J. Tan, Comparative studies on authentication and key exchange methods for 802.11 wireless LAN, Computers and Security, 26 (2007), 401-409.
K. Dunham , Wireless worries and wisdom , Information Systems Security, Auerbach Pubication (2005)
K. Regan, Wireless LAN security: things you should know about WLAN security, Network Security, (2002), 7-9.
M. F. Finneran, Voice over WLANs: the complete guide book , By Elsevier Inc, (2008)
M. Rahman, H. Imai, Security inwireless communication, Kluwer Academic Publishers, Wireless Personal Communications , 22 (2002), 213–228.
N. Baghaei, R. Hunt, Security performance of loaded IEEE 802.11b wireless networks, Computer Communications , 27 (2004), 1746–1756.
Proxim , Wireless network security, ORiNOCO , (2003)
S. Jason , Security in a wireless world , Macworld, 07418647, 20 (2003)
S. Madhavi, An Intrusion detectionsystem in mobile adhoc networks, International Conference on Information Security and Assurance, (2008)
S. Phan, 802.11b update: stepping up your WLAN security , Network Maganize, (2001)
Wikipedia, , http://en.wikipedia.org/wiki/Wireless_security. , ()
Wikipedia, , http://en.wikipedia.org/wiki/Advanced_Encryption_Standard, ()