Table of content

  
• Table of Contents
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
By Jon Edney, William A. Arbaugh
 
Publisher: Addison Wesley
Pub Date: July 15, 2003
ISBN: 0-321-13620-9
Pages: 480
   Copyright
   Praise for Real 802.11 Security: Wi-Fi Protected Access and 802.11i
   Preface
      Why This Book Now?
      Audience
      Organization
      Disclaimer
   Acknowledgments
   Part I.  What Everyone Should Know
      Chapter 1.  Introduction
      Setting the Scene
      Roadmap to the Book
      Notes on the Book
      Chapter 2.  Security Principles
      What Is Security?
      Good Security Thinking
      Security Terms
      Summary
      Chapter 3.  Why Is Wi-Fi Vulnerable to Attack?
      Changing the Security Model
      What Are the Enemies Like?
      Traditional Security Architecture
      Danger of Passive Monitoring
      Summary
      Chapter 4.  Different Types of Attack
      Classification of Attacks
      Attacks Without Keys
      Attacks on the Keys
      Summary
   Part II.  The Design of Wi-Fi Security
      Chapter 5.  IEEE 802.11 Protocol Primer
      Layers
      Wireless LAN Organization
      Basics of Operation in Infrastructure Mode
      Protocol Details
      Radio Bits
      Summary
      Chapter 6.  How IEEE 802.11 WEP Works and Why It Doesn't
      Introduction
      Authentication
      Privacy
      Mechanics of WEP
      Why WEP Is Not Secure
      Summary
      Chapter 7.  WPA, RSN, and IEEE 802.11i
      Relationship Between Wi-Fi and IEEE 802.11
      What Is IEEE 802.11i?
      What Is WPA?
      Differences Between RSN and WPA
      Security Context
      Keys
      Security Layers
      Relationship of the Standards
      Summary
      Chapter 8.  Access Control: IEEE 802.1X, EAP, and RADIUS
      Importance of Access Control
      Authentication for Dial-in Users
      IEEE 802.1X
      EAP Principles
      EAPOL
      Messages Used in IEEE 802.1X
      Implementation Considerations
      RADIUS Remote Access Dial-In User Service
      Summary
      Chapter 9.  Upper-Layer Authentication
      Introduction
      Who Decides Which Authentication Method to Use?
      Use of Keys in Upper-Layer Authentication
      A Detailed Look at Upper-Level Authentication Methods
      Transport Layer Security (TLS)
      Kerberos
      Cisco Light EAP (LEAP)
      Protected EAP Protocol (PEAP)
      Authentication in the Cellular Phone World: EAP-SIM
      Summary
      Chapter 10.  WPA and RSN Key Hierarchy
      Pairwise and Group Keys
      Pairwise Key Hierarchy
      Group Key Hierarchy
      Key Hierarchy Using AES CCMP
      Mixed Environments
      Summary of Key Hierarchies
      Details of Key Derivation for WPA
      Nonce Selection
      Computing the Temporal Keys
      Summary
      Chapter 11.  TKIP
      What Is TKIP and Why Was It Created?
      TKIP Overview
      Per-Packet Key Mixing
      TKIP Implementation Details
      Message Integrity Michael
      Per-Packet Key Mixing
      Summary
      Chapter 12.  AES CCMP
      Introduction
      Why AES?
      AES Overview
      How CCMP Is Used in RSN
      Summary
      Chapter 13.  Wi-Fi LAN Coordination: ESS and IBSS
      Network Coordination
      WPA/RSN Information Element
      Preauthentication Using IEEE 802.1X
      IBSS Ad-Hoc Networks
      Summary
   Part III.  Wi-Fi Security in the Real World
      Chapter 14.  Public Wireless Hotspots
      Development of Hotspots
      Security Issues in Public Hotspots
      How Hotspots Are Organized
      Different Types of Hotspots
      How to Protect Yourself When Using a Hotspot
      Summary
      Chapter 15.  Known Attacks: Technical Review
      Review of Basic Security Mechanisms
      Review of Previous IEEE 802.11 Security Mechanisms
      Attacks Against the Previous IEEE 802.11 Security Mechanisms
      Man-in-the-Middle Attacks
      Problems Created by Man-in-the-Middle Attacks
      Denial-of-Service Attacks
      Summary
      Chapter 16.  Actual Attack Tools
      Attacker Goals
      Process
      Example Scenarios
      Other Tools of Interest
      Summary
      Chapter 17.  Open Source Implementation Example
      General Architecture Design Guidelines
      Protecting a Deployed Network
      Planning to Deploy a WPA Network
      Deploying the Infrastructure
      Practical Example Based on Open Source Projects
      Summary
      Acknowledgments
      References and More Information
   Appendixes
      Appendix A.  Overview of the AES Block Cipher
      Finite Field Arithmetic
      Steps in the AES Encryption Process
      Appendix B.  Example Message Modification
      Example Message Modification
      Appendix C.  Verifying the Integrity of Downloaded Files
      Checking the MD5 Digest
      Checking the GPG Signature
   Acronyms
   References


Real 802.11 Security(c) Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
ISBN: 0321136209
EAN: 2147483647
Year: 2005
Pages: 151

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net