Your 80211 wireless network has no clothes

作者: W.A. Arbaugh , N. Shankar , Y.C.J. Wan , Kan Zhang

DOI: 10.1109/MWC.2002.1160080

关键词: TelecommunicationsThe InternetMunicipal wireless networkInternet accessWireless intrusion prevention systemComputer securityAccess controlComputer scienceFirewall (construction)Wireless networkWireless distribution system

摘要: The explosive growth in wireless networks over the last few years resembles rapid of Internet within decade. To protect internal resources, organizations usually purchased and installed an firewall. We believe that currently deployed access points present a larger security problem than early connections. A large number organizations, based on vendor literature, provided by their is sufficient to prevent unauthorized use. Unfortunately, nothing could be further from truth. While current provide several mechanisms, our work combined with others show all these mechanisms are completely ineffective. As result, vulnerable use of, to, infrastructure. novel solution requires no changes or additions any equipment, easily transparent end users.

参考文章(4)
Scott Fluhrer, Itsik Mantin, Adi Shamir, Weaknesses in the Key Scheduling Algorithm of RC4 selected areas in cryptography. pp. 1- 24 ,(2001) , 10.1007/3-540-45537-X_1
W. Arbaugh, R. Droms, Authentication for DHCP Messages RFC. ,vol. 3118, pp. 1- 17 ,(2001)
Nikita Borisov, Ian Goldberg, David Wagner, Intercepting mobile communications Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 180- 189 ,(2001) , 10.1145/381677.381695
L. Blunk, J. Vollbrecht, PPP Extensible Authentication Protocol (EAP) Internet RFC-2284. ,vol. 2284, pp. 1- 15 ,(1998)