Visible to the public Robust security network association adjusted hybrid authentication schema

TitleRobust security network association adjusted hybrid authentication schema
Publication TypeConference Paper
Year of Publication2014
AuthorsGopejenko, V., Bobrovskis, S.
Conference NameApplication of Information and Communication Technologies (AICT), 2014 IEEE 8th International Conference on
Date PublishedOct
Keywords802.11 standards, 802.1X framework, accounting mechanism, authentication, authorisation, Authorization, Communication system security, cryptography, Encryption, extensible authentication protocol, hybrid authentication schema, IEEE security standard, IEEE standards, message authentication, monitoring mechanism, Network Access Protection, radio networks, Robust Secure Network, robust security network association, Robustness, Servers, telecommunication security, weak authentication, Wired Equivalent Privacy, Wireless communication, Wireless Intrusion Detection System, Wireless Intrusion Prevention System, wireless network, wireless vulnerability situation
Abstract

Wireless network, whether it's ad-hoc or at enterprise level is vulnerable due to its features of open medium, and usually due to weak authentication, authorization, encryption, monitoring and accounting mechanisms. Various wireless vulnerability situations as well as the minimal features that are required in order to protect, monitor, account, authenticate, and authorize nodes, users, computers into the network are examined. Also, aspects of several IEEE Security Standards, which were ratified and which are still in draft are described.

DOI10.1109/ICAICT.2014.7035907
Citation Key7035907