DocumentCode :
263837
Title :
Robust security network association adjusted hybrid authentication schema
Author :
Gopejenko, Viktors ; Bobrovskis, Sergejs
Author_Institution :
Dept. of Natural Sci. & Comput. Technol, ISMA Univ. of Appl. Sci., Riga, Latvia
fYear :
2014
fDate :
15-17 Oct. 2014
Firstpage :
1
Lastpage :
5
Abstract :
Wireless network, whether it´s ad-hoc or at enterprise level is vulnerable due to its features of open medium, and usually due to weak authentication, authorization, encryption, monitoring and accounting mechanisms. Various wireless vulnerability situations as well as the minimal features that are required in order to protect, monitor, account, authenticate, and authorize nodes, users, computers into the network are examined. Also, aspects of several IEEE Security Standards, which were ratified and which are still in draft are described.
Keywords :
IEEE standards; authorisation; cryptography; message authentication; radio networks; telecommunication security; IEEE security standard; accounting mechanism; authorization; encryption; hybrid authentication schema; monitoring mechanism; robust security network association; weak authentication; wireless network; wireless vulnerability situation; Authentication; Communication system security; Cryptography; Robustness; Servers; Wireless communication; 802.11 standards; 802.1X framework; Authentication; Encryption; Extensible Authentication Protocol; Network Access Protection; Robust Secure Network; Wired Equivalent Privacy; Wireless Intrusion Detection System; Wireless Intrusion Prevention System;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Application of Information and Communication Technologies (AICT), 2014 IEEE 8th International Conference on
Conference_Location :
Astana
Print_ISBN :
978-1-4799-4120-9
Type :
conf
DOI :
10.1109/ICAICT.2014.7035907
Filename :
7035907
Link To Document :
بازگشت