Securing and scaling the Wireless LAN
ثبت نشده
چکیده
First generation Wireless LAN (WLAN) systems were all about basic standards, connectivity, and end-user benefits. They did not address a number of key enterprise requirements. Second generation WLAN systems are all about enhanced standards addressing security, Quality of Service (QoS), interoperability, enterprise-wide roaming, and architected solutions with placement of functionality for optimal price, performance, and control. This paper describes Nortel Networks second generation secure WLAN architecture, which is centered on a new networking element: the WLAN Security Switch. Deployment of second generation WLAN solutions will lay the groundwork for third generation WLANs, which will be highly integrated and include support for seamless roaming across public and private networks.
منابع مشابه
Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کاملSecuring a Medical Wireless LAN System
This paper identifies security issues that must be addressed, if a recently proposed Medical Wireless LAN System (MedLAN) is to be accepted. Two classes of security issues are distinguished, technical and managerial.
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملA Unified Approach for Securing Wireless, Remote, and Internal LAN Access
Overview In today’s enterprise environment, the proliferation of access methodologies such as Gigabit wired connections, high-speed broadband access, remote access from various locations (kiosk, internet café), and wireless networks, has driven the need for new services. Mobile and remote access to company resources are essential for remote worker productivity and business efficiency. However, ...
متن کاملSecuring Wireless Communication Against Dictionary Attacks Without Using PKI
Geethakumar, Sarath. M.S., Purdue University, May, 2010. Securing Wireless Communication Against Dictionary Attacks Without Using PKI. Major Professors: Samuel S. Wagstaff Jr. and Melissa Dark. Security of 802.11x wireless encryption standards are increasingly coming under scrutiny as compared to other security protocols and standards. The attacks on 802.11x wireless security protocols are exac...
متن کامل