123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Guidelines For Designing Security For 802.11! (wpa) Networks

Profile Picture
By Author: iris
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The IEEE 802. Hi proposed standard (ratification due at the end of 2003) includes MCTS: Windows Vista security improvements to the 802.11 standard. An interim standard, WiFi Protected Access (WPA), has been implemented in some -wireless devices. This standard improves security by using several techniques and the capabilities of existing wireless devices. An upgrade that provides Windows XP Professional WPA capabilities can be downloaded from the Microsoft Web site.
WPA security includes WPA authentication. If a RADIUS server is available, WPA sup?ports EAP. If a RADIUS server is not available, a preshared key can be used. Encryption is required. Rekeying of unicast and global encryption keys is required by the standard. The Temporal Key Integrity Protocol (TKIP) changes the key for every frame. Key changes are synchronized between the client and the AP. The global encryption key is advertised to connected wireless clients by the AP. A technique called Michael provides integrity. Its 8-byte message integrity code (MIC) is encrypted with the Vista cert ...
... data and the integrity check value of 802.11. The use of the Advanced Encryption Standard (AES) is optional, as some existing equipment might not be able to support the addition of the AES protocol.
Filter MAC addresses. 802.lib wireless networks can provide some security if you specify the MAC addresses of authorized clients. This might not be practical on a large or dynamic network because the access points must be manually configured.
It also is not foolproof security. The MAC address is transmitted in the clear and therefore can be sniffed. With proper tools, an intruder can configure her wireless computer to spoof an approved MAC address.
Search for rogue wireless access points and remove them. Access points can be searched for by searching for SNMP agents. Web and telnet interfaces also might
have banner strings that can identify an access point. Matching this information to authorized access point information helps to identify rogue APs. APs might also have a unique TCP/IP fingerprint that can be used to identify them. A wireless sniffer can also identify the presence of an AP by sniffing for 802.11 packets in the air. Checking the IP address of the packets can help you determine a+ certification what networks they are on.

Total Views: 291Word Count: 369See All articles From Author

Add Comment

Computers Articles

1. Expert Ppc Services In Pune
Author: Brandrisic Media

2. The Future Of Online Medicine Delivery Apps In 2025
Author: simonharris

3. Where Can I Book A Doorstep Laptop Repair Service?
Author: Smita Join

4. Unlocking Business Potential With It Services And Lexington Managed Services
Author: naviworld1h

5. Top 5 Workflow Automation Software Of 2025
Author: Ben Gross

6. Ensuring Medication Safety With Tempgenius: Medication Temperature Monitor And Remote Temperature Probe
Author: Chris Miller

7. Spiral Model Sdlc: Top Choice For Large, High-risk Software Projects?
Author: goodcoders

8. How To Develop An Employee Scheduling App Like Hotschedules?
Author: goodcoders

9. How To Build A User-friendly Mobile Website? 10 Super Tips From Experts
Author: goodcoders

10. How To Choose The Right Refurbished Desktop For Your Needs: A Buyer’s Guide
Author: Scogo Store

11. Why Choose Refurbished Laptops Over New Ones In 2025?
Author: Scogo Store

12. Cloud Computing Trends 2025
Author: Ben Gross

13. Gst-billing-software
Author: Priyanka Patil

14. Digital Transformation In Higher Ed: Leveraging Crm For Student Recruitment
Author: E2S Team

15. How To Contact Sbcglobal Email Support: A Step-by-step Guide
Author: SBCGlobalInfo

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: