Wireless Security Design Overview
نویسندگان
چکیده
Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as the final stage of the Robust Security Network standard, superseded the old WEP technology. This paper describes the technical evolution of wireless security and introduces the future 802.11i with the most recent IEEE draft.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملSecurity overview for m-payed virtual ticketing
A ~ s w ~ K The use of' wireless and mobile devices is espanding worldwide; with, a growing eagerness to find new and useful ways to apply mobile technologies. New applications, as mobile ticketing, can benefit of mobile-payment facility. This paper aims to provide a mobile ticketing system design for PDA, scalable to other mobile devices, presenting a wireless weaknesses overview and security ...
متن کاملPragmatics of Wireless Sensor Networks
Wireless sensor network composed of infrastructureless, small, low-power, low cost, dynamic nature, application oriented, and multihoping wireless nodes, design for the purpose of collecting information by environment sensing, processing and communication. Designing of these networks become more complicated due to deploy nodes characterstics, maintenance of database, security, authentication an...
متن کاملCryptography in Embedded Systems: An Overview
It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Note that a large share o...
متن کاملEmbedding Security in Wireless Embedded Systems
We present an overview of how the need for security will impact the design of embedded systems and the ICs they contain. After a brief introduction to security, we discuss the challenges security processing poses to embedded system architects, integrators, HW designers, and SW engineers. These challenges, as well as current and emerging solutions to address them, are discussed in the context of...
متن کامل