123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Guidelines For Designing Security For 802.11! (wpa) Networks

Profile Picture
By Author: iris
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The IEEE 802. Hi proposed standard (ratification due at the end of 2003) includes MCTS: Windows Vista security improvements to the 802.11 standard. An interim standard, WiFi Protected Access (WPA), has been implemented in some -wireless devices. This standard improves security by using several techniques and the capabilities of existing wireless devices. An upgrade that provides Windows XP Professional WPA capabilities can be downloaded from the Microsoft Web site.
WPA security includes WPA authentication. If a RADIUS server is available, WPA sup?ports EAP. If a RADIUS server is not available, a preshared key can be used. Encryption is required. Rekeying of unicast and global encryption keys is required by the standard. The Temporal Key Integrity Protocol (TKIP) changes the key for every frame. Key changes are synchronized between the client and the AP. The global encryption key is advertised to connected wireless clients by the AP. A technique called Michael provides integrity. Its 8-byte message integrity code (MIC) is encrypted with the Vista cert ...
... data and the integrity check value of 802.11. The use of the Advanced Encryption Standard (AES) is optional, as some existing equipment might not be able to support the addition of the AES protocol.
Filter MAC addresses. 802.lib wireless networks can provide some security if you specify the MAC addresses of authorized clients. This might not be practical on a large or dynamic network because the access points must be manually configured.
It also is not foolproof security. The MAC address is transmitted in the clear and therefore can be sniffed. With proper tools, an intruder can configure her wireless computer to spoof an approved MAC address.
Search for rogue wireless access points and remove them. Access points can be searched for by searching for SNMP agents. Web and telnet interfaces also might
have banner strings that can identify an access point. Matching this information to authorized access point information helps to identify rogue APs. APs might also have a unique TCP/IP fingerprint that can be used to identify them. A wireless sniffer can also identify the presence of an AP by sniffing for 802.11 packets in the air. Checking the IP address of the packets can help you determine a+ certification what networks they are on.

Total Views: 330Word Count: 369See All articles From Author

Add Comment

Computers Articles

1. Extract Real Estate And Lender Data From Zillow And Angi
Author: iweb Data Scraping

2. Web Scraping Weekly Grocery Prices From Blinkit India
Author: FoodDataScrape

3. Extract Cuisine Types Data From Multiple U.s. Food Apps
Author: iweb Data Scraping

4. Scrape Top-selling Grocery Product Data From Kroger
Author: FoodDataScrape

5. Redmart & Fairprice: Quick Commerce Price Intelligence
Author: iweb Data Scraping

6. Top Remote Patient Monitoring Software Solutions Transforming Healthcare In 2025
Author: kaniz vijapura

7. Extract Flavors & Ingredient Insights From Ubereats To Stay Ahead
Author: i web data scraping

8. Unlocking Data Potential With Snowflake Solutions Providers
Author: Trinity Diaz

9. Solution To Extract Weekly Food Menu Data From Deliveroo Uae
Author: FoodDataScrape

10. Is Your Edc A “one-size-fits-all” Platform?
Author: Giselle Bates

11. Epson Thermal Printers: Dealer Guide & Expert Tips
Author: prime poskart

12. How Workforce Management Companies Help Businesses Boost Efficiency And Productivity
Author: Sooreedu7

13. Choosing The Right Time Clock System For Your Business: Features, Benefits & Solutions
Author: Sooreedu7

14. Why Hiring A Local Web Developer In Kuala Lumpur Gives You An Edge
Author: SAnvesh511

15. How Professional Security Services Strengthen Business And Residential Protection
Author: SAnnie511

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: