Book description
"Real 802.11 Securityprovides clear
descriptions of current and emerging security techniques. The
authors handle complex topics nicely, and offer significant
clarification of IEEE draft standards."
--Russ Housley, IETF Security Area Director and founder of Vigil
Security, LLC
"This is certainly the definitive text on the internals of
802.11 security!"
--John Viega, founder and chief scientist, Secure Software,
Inc.
"This book keeps the exposition as straightforward as
possible and enables you to cut through the maze of acronyms,
hacking tools, rumored weaknesses, and vague vendor security claims
to make educated security decisions when purchasing or deploying
WLAN."
--Simon Blake-Wilson, Director of Information Security, BCI
Business professionals and advanced home users are captivated by the convenience of working on wireless networks. But how can privacy and security be maintained effectively? Real 802.11 Security describes an entirely new approach to wireless LAN security based on the latest developments in Wi-Fi technology. This is the book that will show you how to establish real security within your Wi-Fi LAN.
Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will offer a much higher level of security than previously offered and will provide flexible, extremely secure solutions for future products.
Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It provides an overview of security issues, explains how security works in Wi-Fi networks, and explores various security and authentication protocols. The book concludes with an in-depth discussion of real-world security issues and attack tools.
Written by two experts in wireless security, Jon Edney and William Arbaugh, this book shows you how to stay informed and aware when making security decisions, and what steps you can take to implement the most effective, proactive wireless security now and in the future.
0321136209B06242003
Table of contents
- Copyright
- Praise for Real 802.11 Security: Wi-Fi Protected Access and 802.11i
- Preface
- Acknowledgments
- I. What Everyone Should Know
-
II. The Design of Wi-Fi Security
- 5. IEEE 802.11 Protocol Primer
- 6. How IEEE 802.11 WEP Works and Why It Doesn't
- 7. WPA, RSN, and IEEE 802.11i
- 8. Access Control: IEEE 802.1X, EAP, and RADIUS
-
9. Upper-Layer Authentication
- Introduction
- Who Decides Which Authentication Method to Use?
- Use of Keys in Upper-Layer Authentication
- A Detailed Look at Upper-Level Authentication Methods
- Transport Layer Security (TLS)
- Kerberos
- Cisco Light EAP (LEAP)
- Protected EAP Protocol (PEAP)
- Authentication in the Cellular Phone World: EAP-SIM
- Summary
- 10. WPA and RSN Key Hierarchy
- 11. TKIP
- 12. AES–CCMP
- 13. Wi-Fi LAN Coordination: ESS and IBSS
-
III. Wi-Fi Security in the Real World
- 14. Public Wireless Hotspots
-
15. Known Attacks: Technical Review
- Review of Basic Security Mechanisms
- Review of Previous IEEE 802.11 Security Mechanisms
- Attacks Against the Previous IEEE 802.11 Security Mechanisms
- Man-in-the-Middle Attacks
- Problems Created by Man-in-the-Middle Attacks
- Denial-of-Service Attacks
- Summary
- 16. Actual Attack Tools
-
17. Open Source Implementation Example
- General Architecture Design Guidelines
- Protecting a Deployed Network
- Planning to Deploy a WPA Network
- Deploying the Infrastructure
- Practical Example Based on Open Source Projects
- Summary
- Acknowledgments
- References and More Information
- Appendixes
- Acronyms
- References
Product information
- Title: Real 802.11 Security: Wi-Fi Protected Access and 802.11i
- Author(s):
- Release date: July 2003
- Publisher(s): Addison-Wesley Professional
- ISBN: 9780321136206
You might also like
book
Wireless Hacking: Projects for Wi-Fi Enthusiasts
Sales of wireless LANs to home users and small businesses will soar this year, with products …
book
How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN
Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security …
book
Absolute Beginner's Guide to Wi-Fi® Wireless Networking
Absolute Beginner's Guide to Wi-Fi is a book for beginners who want to join the Wi-Fi …
book
WarDriving and Wireless Penetration Testing
Wireless networking has become standard in many business and government networks. This book is the first …