Acronyms

ACK

Acknowledge

ADSL

Asynchronous Digital Subscriber Line

AES

Advanced Encryption Standard

AP

Access Point

AS

Authentication Server

ATM

Automatic Teller Machine

BSS

Basic Service Set

CBC

Cipher Block Chaining

CCM

Counter Mode CBC MAC

CCMP

Counter Mode CBC MAC Protocol

CHAP

Challenge Handshake Authentication Protocol

CRC

Cyclic Redundancy Check

DA

Destination Address

DHCP

Dynamic Host Configuration Protocol

DoS

Denial of Service

EAP

Extensible Authentication Protocol

EAPOL

EAP Over LAN

EKE

Encrypted Key Exchange

ESS

Extended Service Set

GMK

Group Master Key

GPS

Global Positioning System

GSM

Groupe Spécial Mobile

GSSAPI

Generic Security Service Application Program Interface

GTK

Group Transient Key

HMAC

Hash Message Authentication Code

IAKERB

Initial and Pass-Through Authentication Using Kerberos V5

IANA

Internet Assigned Numbers Authority

IBSS

Independent Basic Service Set

ICMP

Internet Control Message Protocol

ICV

Integrity Check Value

IEEE

Institute of Electrical and Electronics Engineers

IETF

Internet Engineering Task Force

IMSI

International Mobile Subscriber Identity

IP

Internet Protocol

ISO

International Standards Organization

ISP

Internet Service Provider

IT

Information Technology

IV

Initialization Vector

KDC

Key Distribution Center

LAN

Local Area Network

LEAP

Light EAP (Cisco)

LLC

Link Layer Control

MAC

Medium Access Control (the meaning used in this book)

MAC (alt)

Message Authentication Code (cryptographic community use)

MIC

Message Integrity Code

MPDU

MAC Protocol Data Unit

MSDU

MAC Service Data Unit

NAK

Negative Acknowledge

NAS

Network Access Server

NIST

National Institute of Standards and Technology

PAE

Port Access Entity

PAP

Password Authentication Protocol

PC

Personal Computer

PDA

Personal Digital Assistant

PEAP

Protected EAP

PKI

Public Key Infrastructure

PLCP

Physical Layer Convergence Protocol

PIN

Personal Identification Number

PMK

Pairwise Master Key

PN

Packet Number

POP

Point of Presence

PPP

Point to Point Protocol

PRF

Pseudo Random Function

PTK

Pairwise Transient Key

PRNG

Pseudo Random Number Generator

USB

Universal Serial Bus

RA

Receiver Address

RADIUS

Remote Authentication Dial-In Service

RFC

Request For Comment

RH

RSN Header

RSN

Robust Security Network

SA

Source Address

SIM

Subscriber Identity Module

SRP

Secure Remote Password

SSID

Service Set Identifier

SSL

Secure Socket Layer

STA

Wireless Station

TA

Transmitter Address

TGi

IEEE 802.11 Task Group 'i'

TGS

Ticket Granting Service

TGT

Ticket Granting Ticket

TKIP

Temporal Key Integrity Protocol

TLS

Transport Layer Security

TSC

TKIP Sequence Counter

VPN

Virtual Private Network

WEP

Wired Equivalent Privacy

WPA

Wi-Fi Protected Access



Real 802.11 Security(c) Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
ISBN: 0321136209
EAN: 2147483647
Year: 2005
Pages: 151

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net