x

Our Privacy Policy has changed. By using this site, you agree to the Privacy Policy.

Real 802. 11 Security Wi-Fi Protected Access and 802. 11i

ISBN-10: 0321136209
ISBN-13: 9780321136206
Edition: 2004
List price: $64.99 Buy it from $3.00
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: bull; bull;Describes new approach to wireless security based on Wi-Fi Protected Access (WPA) and the 802.11i standard (releasing summer 2003). bull;Wireless equipment based on the 802.11 standard accounts for up to 99% of the wireless networking  More...

Used Starting from $29.40
New Starting from $53.69
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $64.99
Copyright year: 2004
Publisher: Addison Wesley Professional
Publication date: 7/15/2003
Binding: Paperback
Pages: 480
Size: 7.00" wide x 9.00" long x 1.00" tall
Weight: 1.958
Language: English

bull; bull;Describes new approach to wireless security based on Wi-Fi Protected Access (WPA) and the 802.11i standard (releasing summer 2003). bull;Wireless equipment based on the 802.11 standard accounts for up to 99% of the wireless networking market. bull;Written by experts on wireless security. Arbaugh brings a hardcore security background and Edney brings industry experience.

Preface
Acknowledgments
What Everyone Should Know
Introduction
Setting the Scene
Roadmap to the Book
Notes on the Book
Security Principles
What Is Security?
Good Security Thinking
Don't Talk to Anyone You Don't Know
Accept Nothing Without a Guarantee
Treat Everyone as an Enemy until Proved Otherwise
Don't Trust Your Friends for Long
Use Well-Tried Solutions
Watch the Ground You Are Standing on for Cracks
Security Terms
Summary
Why Is Wi-Fi Vulnerable to Attack?
Changing the Security Model
What Are the Enemies Like?
Gaming Attackers
Profit or Revenge Attackers
Ego Attackers
Traditional Security Architecture
Put Wireless LAN in the Untrusted Zone
Make Wi-Fi LAN Trusted
Danger of Passive Monitoring
Summary
Different Types of Attack
Classification of Attacks
Attacks Without Keys
Snooping
Man-in-the-Middle Attack (Modification)
Attacks on the Keys
One-Time Passwords
Burying the Keys
Wireless Attacks
Attacking the Keys Through Brute Force
Dictionary Attacks
Algorithmic Attacks
Summary
The Design of Wi-Fi Security
IEEE 802.11 Protocol Primer
Layers
Wireless LAN Organization
Basics of Operation in Infrastructure Mode
Beacons
Probing
Connecting to an AP
Roaming
Sending Data
Protocol Details
General Frame Formats
AC header
Management Frames
Radio Bits
Summary
How IEEE 802.11 WEP Works and Why It Doesn't
Introduction
Authentication
Privacy
Use of RC4 Algorithm
Initialization Vector (IV)
WEP Keys
Mechanics of WEP
Fragmentation
Integrity Check Value (ICV)
Preparing the Frame for Transmission
RC4 Encryption Algorithm
Why WEP Is Not Secure
Authentication
Access Control
Replay Prevention
Message Modification Detection
Message Privacy
RC4 Weak Keys
Direct Key Attacks
Summary
WPA, RSN, and IEEE 802.11i
Relationship Between Wi-Fi and IEEE 802.11
What Is IEEE 802.11i?
What Is WPA?
Differences Between RSN and WPA
Security Context
Keys
Security Layers
How the Layers Are Implemented
Relationship of the Standards
List of Standards
Pictorial Map
Summary
Access Control: IEEE 802.1X, EAP, and RADIUS
Importance of Access Control
Authentication for Dial-in Users
IEEE 802.1X
IEEE 802.1X in a Simple Switched Hub Environment
IEEE 802.1X in Wi-Fi LANs
EAP Principles
EAP Message Formats
EAPOL
EAPOL-Start
EAPOL-Key
EAPOL-Packet
EAPOL-Logoff
Messages Used in IEEE 802.1X
Authentication Sequence
Implementation Considerations
RADIUS--Remote Access Dial-In User Service
RADIUS Mechanics
EAP over RADIUS
Use of RADIUS in WPA and RSN
Summary
Upper-Layer Authentication
Introduction
Who Decides Which Authentication Method to Use?
Use of Keys in Upper-Layer Authentication
Symmetric Keys
Asymmetric Keys
Certificates and Certification Authorities
A Detailed Look at Upper-Level Authentication Methods
Transport Layer Security (TLS)
Functions of TLS
Handshake Exchange
Relationship of TLS Handshake and WPA/RSN
TLS over EAP
Summary of TLS
Kerberos V5V5
Using Tickets
Kerberos Tickets
Obtaining the Ticket-Granting Ticket
Service Tickets
Cross-Domain Access
How Tickets Work
Use of Kerberos in RSN
Cisco Light EAP (LEAP)
Protected EAP Protocol (PEAP)
Phase 1
Phase 2
Status of PEAP
Authentication in the Cellular Phone World: EAP-SIM
Overview of Authentication in a GSM Network
Linking GSM Security to Wi-Fi LAN Security
EAP-SIM
Status of GSM-SIM Authentication
Summary
WPA and RSN Key Hierarchy
Pairwise and Group Keys
Pairwise Key Hierarchy
Creating and Delivering the PMK
Computing the Temporal Keys
Exchanging and Verifying Key Information
Completing the Handshake
Group Key Hierarchy
Summary of the Key Establishment Process
Key Hierarchy Using AES-CCMP
Mixed Environments
Summary of Key Hierarchies
Details of Key Derivation for WPA
Four-Way Handshake
Group Key Handshake
Nonce Selection
Computing the Temporal Keys
Summary
TKIP
What Is TKIP and Why Was It Created?
TKIP Overview
Message Integrity
IV Selection and Use
Per-Packet Key Mixing
TKIP Implementation Details
Message Integrity--Michael
Countermeasures
Computation of the MIC
Per-Packet Key Mixing
Substitution Table or S-Box
Phase 1 Computation
Phase 2 Computation
Summary
AES-CCMP
Introduction
Why AES?
AES Overview
Modes of Operation
Offset Codebook Mode (OCB)
How CCMP Is Used in RSN
Steps in Encrypting a Transmission
CCMP Header
Overview of Implementation
Steps in Encrypting an MPDU
Decrypting MPDUs
Summary
Wi-Fi LAN Coordination: ESS and IBSS
Network Coordination
ESS Versus IBSS
Joining an ESS Network
WPA/RSN Information Element
Validating the Information Elements
Preauthentication Using IEEE 802.1X
IBSS Ad-Hoc Networks
Summary
Wi-Fi Security in the Real World
Public Wireless Hotspots
Development of Hotspots
Public Wireless Access Defined
Barriers to Growth
Security Issues in Public Hotspots
How Hotspots Are Organized
Subscribers
Access Points
Hotspot Controllers
Authentication Server
Different Types of Hotspots
Airports
Hotels
Coffee Shops
Homes
How to Protect Yourself When Using a Hotspot
Personal Firewall Software
Virtual Private Network (VPN)
Summary
Known Attacks: Technical Review
Review of Basic Security Mechanisms
Confidentiality
Integrity
Review of Previous IEEE 802.11 Security Mechanisms
Confidentiality
RC4 and WEP
Integrity and Authentication
Attacks Against the Previous IEEE 802.11 Security Mechanisms
Confidentiality
Access Control
Authentication
Man-in-the-Middle Attacks
Management Frames
ARP Spoofing
Problems Created by Man-in-the-Middle Attacks
802.1x and EAP
PEAP
Denial-of-Service Attacks
Layer 2 Denial-of-Service Attacks Against All Wi-Fi-Based Standards
WPA Cryptographic Denial-of-Service Attack
Summary
Actual Attack Tools
Attacker Goals
Process
Reconnaissance
Example Scenarios
Planning
Collection
Analysis
Execution
Other Tools of Interest
Airsnort
Airjack
Summary
Open Source Implementation Example
General Architecture Design Guidelines
Protecting a Deployed Network
Isolate and Canalize
Upgrade Equipment's Firmware to WPA
What to Do If You Can't Do Anything
Planning to Deploy a WPA Network
Deploying the Infrastructure
Add a RADIUS Server for IEEE 802.1X Support
Use a Public Key Infrastructure for Client Certificates
Install Client IEEE 802.1X Supplicant Software
Practical Example Based on Open Source Projects
Server Infrastucture
Building an Open Source Access Point
Making It All Work
Summary
Acknowledgments
References and More Information
Appendixes
Overview of the AES Block Cipher
Finite Field Arithmetic
Addition
Subtraction
Multiplication
Division
Galois Field GF()
Conclusion
Steps in the AES Encryption Process
Round Keys
Computing the Rounds
Decryption
Summary of AES
Example Message Modification
Verifying the Integrity of Downloaded Files
Checking the MD5 Digest
Checking the GPG Signature
Acronyms
References
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×