Copyright: 2005
Pages: 266
ISBN: 9781580537551

Artech House is pleased to offer you this title in a special In-Print-Forever® ( IPF® ) hardbound edition. This book is not available from inventory but can be printed at your request and delivered within 2-4 weeks of receipt of order. Please note that because IPF® books are printed on demand, returns cannot be accepted.

Our Price: $109.00
Our Price: $79.00

With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers you practical insight into identifying and overcoming these security issues. Including detailed descriptions of possible solutions to a number of specific security problems, the book gives you the hands-on techniques that you need to secure wireless networks in the enterprise and the home. This handy reference also defines key security terms to help you fully understand concepts and evaluate security products on the market today. Moreover, the book discusses the future direction of the WLAN and WMAN industry, allowing you to plan ahead for emerging technologies in the field.
Table Of Contents
Introduction to Wireless LAN Security.; Background: 802.11 Wireless LANs - 802.11a. 802.11b. 802.11g. 802.11e.; Over-the-Wire Encryption ‑ WEP and its Problems.; TKIP and Michael - Key Hierarchy. WPA.; 802.11i.; Authentication in WLANs - 802.1X Framework. TLS. EAP. EAP-Authentication Methods. Radius and Dial-Up Authentication. ; Security in WLAN Roaming - Roaming Models. The NAI. Authentication in HotSpots. Radius Networks. Authorization and Billing.; Security in 3G-WLAN Inter-Network Roaming - The UMTS model and 3G. Authentication in GSM and 3G (SIM). EAP-SIM and its Weaknesses. Roaming Models. Authorization and Billing.; 80216 WiMax¬Æ Security. MAC Security Sublayer. Network Entry and Initialization. The PKM Protocol. Certificates and PKI in WMAN. Security Issues in 802.16;


  • Lakshminath R. Dondeti Lakshminath R. Dondeti is a senior research engineer in the advanced technology group at Nortel Networks, Billerica, MA. Dr. Dondeti received his B.E. from Motilal Nehru Regional Engineering College, Allahabad, India. He received his M.S. and Ph.D. from The University of Nebraska-Lincoln, all in computer science.
  • Thomas Hardjono Thomas Hardjono is a Principal Scientist in the CTO Office at VeriSign, Inc., Mountain View, CA. Dr. Hardjono received his B.Sc. (Hons) in computer science from the University of Sydney, and Ph.D. in computer science from the University of New South Wales, Sydney, Australia.