Abstract

This chapter gives a brief overview of the major areas that must be addressed in network security and identifies the major security exposure introduced through the use of wireless LANs. Then it examines the basic capabilities of WEP and describes why it is considered inadequate for any commercial installation. The main focus of the study is on the newer IEEE security protocols like 802.11i and 802.1 xs, how they work, and the level of protection they will afford. In particular, it describes the security mechanisms that will be most appropriate for voice applications. Security is an ongoing effort, and tools and techniques must be continuously evaluated in light of the new threats. Voice devices are a particular concern as most of the first generation WLAN voice handsets have fallen a generation behind in their security features. The key issue to recognize with WLAN security is that implementing these capabilities is the user's responsibility. That means the network designer must understand the risks and the capabilities of the various solutions and ensure that they are implemented throughout the network. Further, from a practical standpoint, a company may be required to support older devices that are not capable of supporting the newest security features. In particular, the chapter describes the security mechanisms that will be most appropriate for voice applications.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.