Skip to main content Accessibility help
×
Home
Hostname: page-component-99c86f546-5rzhg Total loading time: 0.342 Render date: 2021-12-08T13:47:37.057Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "metricsAbstractViews": false, "figures": true, "newCiteModal": false, "newCitedByModal": true, "newEcommerce": true, "newUsageEvents": true }

2 - Wireless security

Published online by Cambridge University Press:  26 February 2010

Amitabh Mishra
Affiliation:
Virginia Polytechnic Institute and State University
Get access

Summary

Wireless networks are typically divided into three classes depending on their range of transmissions. We have personal area networks (PANS) that have a very low transmission range, of the order of several meters; Bluetooth happens to be the representative network or technology when wireless personal area networks are mentioned. On a slightly larger transmission scale, of the order of 100–200 meters, we have wireless local area networks (LANs), known as 802.11 or WiFi, which are very well deployed all over the world. The personal area and local area networks have been primarily designed for indoor applications. Networks that have transmission in the range of several kilometers are known as wireless wide area networks (WANs), and cellular networks of different vintages are prime examples of such networks. So any discussion of security in a wireless environment will not be complete unless the proposed security schemes for these three distinct networks are examined. In this chapter, I briefly go over the security schemes of wireless PAN, LAN, and WAN networks. For readers interested in knowing more about these topics, appropriate references are highlighted. I begin this chapter by discussing WiFi security, followed by cellular network security, and concluding with the security of personal area networks.

Wireless local area networks (IEEE 802.11) security

Introduction

A wireless local area network (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative to, a wired LAN. Wireless local area networks transmit and receive data over the air via RF technology, minimizing the need for any wired connections, and in turn, combining data connectivity with user mobility.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2008

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

IEEE Standard 802.11, 1999 Edition (R2003) (ISO/IEC 8802–11:1999), IEEE Standard for Information Technology – Telecommunications and Information Exchange between Systems – Local And Metropolitan Area Network Specification Requirements – Part II. Wireless LAN Medium Aceess Control (MAC) and Physical Layer (PHY) Specifications, 1999.
Bing, B., Wireless Local Area Networks, John Wiley and Sons, 2002.Google Scholar
IEEE 802.11 Study Group, http://groupr.ieee.org/groups/802/11.
R. Housely and D. Whiting, Temporal Key Hash, IEEE Standard 802.11-01/550.
R. Housely, D. Whiting, and N. Ferguson, Alternative Temporal Key Hash, IEEE Standard 802.11i, 11-02-282r0.
T. Moore and C. Chaplin, TGi Security Overview, IEEE Standard 802.11i, 10-02-114r1.
www.esat.kuleuven.ac.be/~rijmen/rijndael.
National Institute of Standards and Technology, www.nist.gov.
P. Rogaway, www.cs.ucdavis.edu/~rogaway.
S. Frankel, R. Glenn, and S. Kelly, “The AES-CBC Cipher Algorithm and Its Use with IPSec, www1.ietf.org/mail-archive/web-dd/ietf-announce-old/Current/msg26234.html, 2003.
R. Housely, D. Whiting, and N. Fergusen, AES-CTR-Mode-with-CBC-MAC, 80211-02-001r1.
3rd Generation Partnership Project: Technical Specification Group (Services and System Aspects) 3G Security; Specifications of A5/3 Encryption Algorithms for GSM and ECSD, and the GEA3 Encryption Algorithm for GPRS; Document 1:A5/3 and GEA3 Specifications (Release 6), 3GPP TS 55.216, ver. 6.2.0, 2003.
ETSI, Digital Cellular Telecommunications System (Phase 2 +), General Packet Radio Service (GPRS); Service Description; Stage 2, GSM 03.60, ver. 6.4.0, 1997.
3GPP Technical Specifications: www.3gpp.org.
Kaaranen, H., Ahitiainen, A., Laitinen, L., Naghian, S., and Niemi, V., UMTS Networks: Architecture, Mobility, and Services, John Wiley and Sons, 2001.Google Scholar
Bisdikian, C., Bhagwat, P., Gaucher, B., et al., “WiSAP – A wireless personal access network for handheld computing devices,” IEEE Personal Commun., vol. 5, no. 6, 1998, pp. 18–25.CrossRefGoogle Scholar
Bluetooth SIG, Bluetooth – Specification of the Bluetooth System, vol. 1, core, ver. 1.1.

Send book to Kindle

To send this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle.

Note you can select to send to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Wireless security
  • Amitabh Mishra, Virginia Polytechnic Institute and State University
  • Book: Security and Quality of Service in Ad Hoc Wireless Networks
  • Online publication: 26 February 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511619755.003
Available formats
×

Send book to Dropbox

To send content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to Dropbox.

  • Wireless security
  • Amitabh Mishra, Virginia Polytechnic Institute and State University
  • Book: Security and Quality of Service in Ad Hoc Wireless Networks
  • Online publication: 26 February 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511619755.003
Available formats
×

Send book to Google Drive

To send content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about sending content to Google Drive.

  • Wireless security
  • Amitabh Mishra, Virginia Polytechnic Institute and State University
  • Book: Security and Quality of Service in Ad Hoc Wireless Networks
  • Online publication: 26 February 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511619755.003
Available formats
×