Robust security network association adjusted hybrid authentication schema
Title | Robust security network association adjusted hybrid authentication schema |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Gopejenko, V., Bobrovskis, S. |
Conference Name | Application of Information and Communication Technologies (AICT), 2014 IEEE 8th International Conference on |
Date Published | Oct |
Keywords | 802.11 standards, 802.1X framework, accounting mechanism, authentication, authorisation, Authorization, Communication system security, cryptography, Encryption, extensible authentication protocol, hybrid authentication schema, IEEE security standard, IEEE standards, message authentication, monitoring mechanism, Network Access Protection, radio networks, Robust Secure Network, robust security network association, Robustness, Servers, telecommunication security, weak authentication, Wired Equivalent Privacy, Wireless communication, Wireless Intrusion Detection System, Wireless Intrusion Prevention System, wireless network, wireless vulnerability situation |
Abstract | Wireless network, whether it's ad-hoc or at enterprise level is vulnerable due to its features of open medium, and usually due to weak authentication, authorization, encryption, monitoring and accounting mechanisms. Various wireless vulnerability situations as well as the minimal features that are required in order to protect, monitor, account, authenticate, and authorize nodes, users, computers into the network are examined. Also, aspects of several IEEE Security Standards, which were ratified and which are still in draft are described. |
DOI | 10.1109/ICAICT.2014.7035907 |
Citation Key | 7035907 |
- monitoring mechanism
- wireless vulnerability situation
- wireless network
- Wireless Intrusion Prevention System
- Wireless Intrusion Detection System
- Wireless communication
- Wired Equivalent Privacy
- weak authentication
- telecommunication security
- Servers
- Robustness
- robust security network association
- Robust Secure Network
- radio networks
- Network Access Protection
- 802.11 standards
- message authentication
- IEEE standards
- IEEE security standard
- hybrid authentication schema
- extensible authentication protocol
- encryption
- Cryptography
- Communication system security
- authorization
- authorisation
- authentication
- accounting mechanism
- 802.1X framework