Converging wired and wireless authentication
β Scribed by Bruce Potter
- Publisher
- Elsevier Science
- Year
- 2007
- Tongue
- English
- Weight
- 99 KB
- Volume
- 2007
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
β¦ Synopsis
Converging wired and wireless authentication
Thankfully, our ability to architect and manage secure wireless networks has improved over the last several years. In the past, wireless networks were a completely separate entity from their wired counterparts and had high costs associated with them. But due to changes in technology, changes in wired networks, and even changes in laws and regulations, wired and wireless networks are beginning to converge. The first major aspect of convergence is authentication; bringing users and devices onto the network in a secure and consistent fashion.
History of wireless authentication
Wireless LANs took the world by storm around 2001. At the time, user demand for wireless networking far outstripped the sophistication of the security protocols. Bruce Potter, founder, The Shmoo Group Look at any network diagram in any large enterprise, and you will see two very different types of networks; wired and wireless. Wired networks are depicted as an array of boxes and lines, connecting through routers and switches in a manner that we have become accustomed to over the last several decades. Wireless networks, on the other hand, are usually just clouds, a testament to the unstructured nature of wireless LANs and our ability to architect them. Wireless networks are often surrounded by numerous security mechanisms such as attack sensors, authentication servers, and VPN gateways. A wireless network often looks like a wart on a network diagram, waiting for someone to remove it when the users aren't looking.
AUTHENTICATION
Bruce Potter business function. In this case, scan the machine and try and determine where it is vulnerable -this will help you understand how it was infected.
π SIMILAR VOLUMES
Distributed architectures for industrial applications are a new opportunity to realize cost-effective, flexible, scalable and reliable systems. Direct interfacing of sensors and actuators to the industrial communication network improves the system performance, because process data and diagnostics ca
## Abstract The Internet is a heterogeneous environment comprising wired and wireless components, and transport protocols with different error recovery strategies. We use simulations to study the behaviour of random early detection (RED) gateways in such heterogeneous environments. We investigate t