the future of WLAN security

Roese, John
October 2002
Wireless Week;10/21/2002, Vol. 8 Issue 38, p20
Trade Publication
Discusses wireless local are network security. Way to ensure security around the network; Standards for network security; Description of the Rapid re-Keying technique.


Related Articles

  • WLANs vulnerable to security breaches, Gartner research predicts.  // Frontline Solutions;Sep2001, Vol. 2 Issue 10, p52 

    Reports on the vulnerability of wireless local area networks (WLAN) to security breaches in the United States. Estimates on the number of firms suffering from security breaches in their computer systems; Sources of WLAN security flaws.

  • eFiles.  // eWeek;8/27/2001, Vol. 18 Issue 33, p35 

    Reports developments related to wireless technology. Tribulations on serious security exposures from deployed wireless local area networks (WLAN); Set-up of security standards for WLAN; Increase on production of wireless or mobile computing devices.

  • concerns don't hurt Wi-Fi popularity. Albright, Peggy // Wireless Week;6/3/2002, Vol. 8 Issue 22, p34 

    Discusses security concerns over the use of the 802.11 wireless local network technology in the U.S. Benefits of wireless local area network technologies; Information on the encryption mechanism of the technology known as Wired Equivalent Privacy; Implications of the growing popularity of the...

  • WEP can't stand alone for security. H.B. // eWeek;04/16/2001, Vol. 18 Issue 15, p49 

    Focuses on the Wireless Equivalent Privacy (WEP) security protocol for wireless local area network (WLAN) standards. Susceptibility of WLAN to security breaches; Limitations of WEP.

  • Bad Reception. Hogan, Mike // Entrepreneur;Feb2002, Vol. 30 Issue 2, p31 

    Examines the threats to the security of companies which use Wireless Local Area Network. Development of software applications by computer hackers to threaten the privacy of business entities which use online technology; Ways to secure wireless network; Information on the devices which will...

  • The scoop on wireless LAN snoops. Merserve, Jason // Network World;9/17/2001, Vol. 18 Issue 38, p17 

    Reports on Guardent Inc.'s demonstration of the potential dangers of unprotected wireless local area network (LAN) traffic in Cambridge, Massachusetts. Types of information gathered by the firm from wireless LAN; Sources of security threats to wireless LAN.

  • Wireless LAN security. Janss, Steve // Network World;12/17/2001, Vol. 18 Issue 51, p45 

    Focuses on products that resolve problems in 802.11b security of wireless local area networks. AccessPoint 6000 from 3Com; Access Server from Avaya; Cisco's Aironet 350 and ACS; Colubris' CN 1000; Extra encryption that numerous 802.11b products claim to provide. INSET: Alternatives to 802.11b..

  • A FORMAL VERIFICATION FRAMEWORK FOR SECURITY POLICY MANAGEMENT IN MOBILE IP BASED WLAN. Maity, Soumya; Bera, P.; Ghosh, S. K.; Dasgupta, Pallab // International Journal of Network Security & Its Applications;Oct2010, Vol. 2 Issue 4, p194 

    The continuous advancement of wireless technologies especially for enterprise Wireless local area networks (LANs), demands well defined security mechanisms with appropriate architectural support to overcome various security loopholes. Implementing security policies on the basis of Role based...

  • Wireless Local Area Networks Security: An Overview. Dhull, Suman; Singh, Jatinder // International Journal of Educational Administration;2010, Vol. 2 Issue 3, p733 

    The article offers information on the security of wireless local area networks (WLANs). It says that WLANs connect devices to a wider network through wireless distribution method with ease installation. It also mentions that public enterprises have even offer free wireless Internet access to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics