Your 802.11 wireless network has no clothes

被引:83
作者
Arbaugh, WA [1 ]
Shankar, N
Wan, YCJ
Zhang, K
机构
[1] Univ Maryland, Dept Comp Sci, College Pk, MD 20742 USA
[2] Hewlett Packard Labs, Palo Alto, CA USA
来源
IEEE WIRELESS COMMUNICATIONS | 2002年 / 9卷 / 06期
关键词
D O I
10.1109/MWC.2002.1160080
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The explosive growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. To protect internal resources, organizations usually purchased and installed an Internet firewall. We believe that the currently deployed wireless access points present a larger security problem than the early Internet connections. A large number of organizations, based on vendor literature, believe that the security provided by their deployed wireless access points is sufficient to prevent unauthorized access and use. Unfortunately, nothing could be further from the truth. While the current access points provide several security mechanisms, our work combined with the work of others show that all of these mechanisms are completely ineffective. As a result, organizations with deployed wireless networks are vulnerable to unauthorized use of, and access to, their internal infrastructure. In this article we present a novel solution that requires no changes or additions to any deployed wireless equipment, and is easily deployed and transparent to end users.
引用
收藏
页码:44 / 51
页数:8
相关论文
共 7 条
  • [1] Arbaugh W. A., 2002, 80211 IEEE WORK GROU
  • [2] Borisov Nikita, 2001, 7 ANN INT C MOB COMP
  • [3] Droms R., 2001, AUTHENTICATION DHCP
  • [4] FLUHRER S, 2001, SEL AREAS CRYPTOGRAP
  • [5] *LAN MAN STAND IEE, 1999, WIR LAN MED ACC CONT
  • [6] Shankar Narendar, 2001, TRANSPARENT KEY MANA
  • [7] WALKER J, 2000, 80211 IEEE TASK GROU