Authentication across the airwaves
โ Scribed by Adrian Davis
- Book ID
- 104392400
- Publisher
- Elsevier Science
- Year
- 2007
- Tongue
- English
- Weight
- 365 KB
- Volume
- 2007
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
Security
To set the scene, let's see where wireless authentication fits in. We can define several components that make up wireless networks, as shown in figure 1 Users can employ devices such as laptops, smartphones, PDAs, or BlackBerrys to connect to the Internet or the corporate network via an access point. Connections between devices and access points are usually based on wireless LAN or cellular/mobile technologies; connections from the access point to the corporate network may use the telecommunications infrastructure and may travel over an IP-based net-work, such as the internet. These mobile devices and connections combine to provide users with location-independent access to the corporate network and the Internet.
Authentication in wireless networks addresses a combination of users, devices, and networks. We will examine how the most popular wireless technologies, Wi-Fi, WiMAX and cellular/mobile, handle authentication in the corporate environment. We will explore the authentication mechanisms in the early versions of the popular IEEE 802.11 (Wi-Fi) standard, moving on to IEEE 802.11i (also known as Wi-Fi Protected Access, WPA). We will explain the authentication mechanisms used in cellular phone networks, and those used in IEEE 802.16 (Wi-MAX).
๐ SIMILAR VOLUMES
Henry Schmitt wants nothing more than a quiet life and a daily ration of instant noodles. At least until he learns the terrible secret that drove his father away--the Plague that killed his mother and ravaged his country was created by those now in power. His only chance to expose the truth is throu
Henry Schmitt wants nothing more than a quiet life and a daily ration of instant noodles. At least until he learns the terrible secret that drove his father away--the Plague that killed his mother and ravaged his country was created by those now in power. His only chance to expose the truth is throu