Wireless Security Design Overview

نویسندگان

  • Nidal Aboudagga
  • Damien Giry
  • Jean-Jacques Quisquater
چکیده

Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as the final stage of the Robust Security Network standard, superseded the old WEP technology. This paper describes the technical evolution of wireless security and introduces the future 802.11i with the most recent IEEE draft.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Security overview for m-payed virtual ticketing

A ~ s w ~ K The use of' wireless and mobile devices is espanding worldwide; with, a growing eagerness to find new and useful ways to apply mobile technologies. New applications, as mobile ticketing, can benefit of mobile-payment facility. This paper aims to provide a mobile ticketing system design for PDA, scalable to other mobile devices, presenting a wireless weaknesses overview and security ...

متن کامل

Pragmatics of Wireless Sensor Networks

Wireless sensor network composed of infrastructureless, small, low-power, low cost, dynamic nature, application oriented, and multihoping wireless nodes, design for the purpose of collecting information by environment sensing, processing and communication. Designing of these networks become more complicated due to deploy nodes characterstics, maintenance of database, security, authentication an...

متن کامل

Cryptography in Embedded Systems: An Overview

It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Note that a large share o...

متن کامل

Embedding Security in Wireless Embedded Systems

We present an overview of how the need for security will impact the design of embedded systems and the ICs they contain. After a brief introduction to security, we discuss the challenges security processing poses to embedded system architects, integrators, HW designers, and SW engineers. These challenges, as well as current and emerging solutions to address them, are discussed in the context of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004