RE: 802.11i research papers

From: Rosado, Rafael (Rafael) (rarosado_at_lucent.com)
Date: 02/12/04

  • Next message: Pete Hunt: "Re: Securing webmail - changing a port necessary to ensure security?"
    To: Andy Blair <blai0015@umn.edu>, security-basics@securityfocus.com
    Date: Thu, 12 Feb 2004 12:24:59 -0700
    
    

    Andy,

    Visit the WiFi Alliance website. They have several whitepapers associated
    with WPA (Wifi Protected Access) which is the replacement to WEP (TKIP is
    the interim solution to WEP - dynamically assigned WEP keys, but 802.11i is
    the combination of WPA and AES encyrption).

    The WiFi Alliance website is -
    http://www.wi-fi.org/OpenSection/protected_access.asp?

    Good luck with your research!

    Rafael Rosado, CISSP, CISA
    IT Security Manager
    Lucent Technologies
    IT Infrastructure - Network Design
    2400 SW 145th Avenue
    Miramar, Florida 33027
    Office: 954-885-2176
    Facsimile: 954-885-3861
    Email: rarosado@lucent.com

    This electronic mail message contains information belonging to Lucent
    Technologies, which may be confidential and/or legal privileged. The
    information is intended only for the use of the individual or entity named
    above. If you are not the intended recipient, you are hereby notified that
    any disclosure, printing, copying, distribution, or the taking of any action
    in reliance on the contents of this electronically mailed information is
    strictly prohibited. If you receive this message in error, please
    immediately notify us by electronic mail and delete this message.

    -----Original Message-----
    From: Andy Blair [mailto:blai0015@umn.edu]
    Sent: Wednesday, February 11, 2004 1:40 PM
    To: security-basics@securityfocus.com
    Subject: 802.11i research papers

    I am doing a research project on 802.11i and am looking for good research
    papers on the subject. I have found it difficult to try and wade through
    white papers that are essentially advertisements to find any academic,
    informative papers.

    Specifically, I am looking at how 802.11i has addressed problems found in
    WEP and other security features that the protocol has implemented.

    If anyone knows of any good papers or of any websites that collect academic
    and research rather than propoganda papers, I would love to visit them. If
    you know of any other source of info on this topic it would be helpful as
    well.

    Thanks for the help!
    Andrew Blair

    ---------------------------------------------------------------------------
    Free trial: Astaro Security Linux -- firewall with Spam/Virus Protection

    Protect your network with the comprehensive security solution that
    integrates six applications for ease of use and lower TCO.

    Firewall - Virus protection - Spam protection - URL blocking - VPN
    - Wireless security.

    Download 30-day evaluation at:
    http://www.astaro.com/php/contact/securityfocus.php
    ----------------------------------------------------------------------------

    ---------------------------------------------------------------------------
    Free trial: Astaro Security Linux -- firewall with Spam/Virus Protection

    Protect your network with the comprehensive security solution that
    integrates six applications for ease of use and lower TCO.

    Firewall - Virus protection - Spam protection - URL blocking - VPN
    - Wireless security.

    Download 30-day evaluation at:
    http://www.astaro.com/php/contact/securityfocus.php
    ----------------------------------------------------------------------------


  • Next message: Pete Hunt: "Re: Securing webmail - changing a port necessary to ensure security?"

    Relevant Pages

    • RE: 802.11i research papers
      ... IT Infrastructure - Network Design ... Subject: 802.11i research papers ... with WPA which is the replacement to WEP (TKIP is ... WEP and other security features that the protocol has implemented. ...
      (Security-Basics)
    • Re: Wireless Networking
      ... SANS has 42 papers on wireless security: ... I also used the OReilly book 802.11 Security ... The short answer is that using WEP will prevent sniffing, ... read some of the above papers to decide if it is secure enough for you. ...
      (Security-Basics)
    • Re: A home computer is a forensic evidence room
      ... A security plan that first covers recovery, and data protection is key. ... Anyone within range of your wireless transmission could connect to your network and use it or capture your computing sessions. ... reset the wireless router to factory: press and hold reset 20 seconds. ...
      (alt.2600)
    • MTIndia Newsletter - Proactive provisions to protect PHI
      ... on India's Information Security Environment. ... Security orientation of the Indian IT services and ITES-BPO market. ... Protection is through implication and therefore damages ... transcription and information management services to University of Michigan ...
      (sci.med.transcription)
    • Re: Vistas Security Rendered Completely Useless by New Exploit
      ... security conference was an analysis a number ... of the protection mechanisms built into Windows Vista and Windows Server ... presented a number of attacks against Vista's various security features ... impact of 'buffer overflows' ...
      (microsoft.public.windows.vista.general)