Summary of Wireless Security Standards

Summary of Wireless Security Standards
Cc99 Ff Dot
A. Bluetooth Protocol
Cc99 Ff Dot
  • Uses handheld portable devices
  • Designed for use within 10-meter distances
  • Security operates as a "trusted device" at the data-link layer
  • Device, not the user, is trusted
  • Authentication is based upon a shared key
  • Bluetooth is not an end-to-end security solution
Cc99 Ff Dot
B. Wireless Application Protocol (WAP)
Cc99 Ff Dot
  • WAP specification defines protocols at the Application, Session, and Transport layers
  • WAP Protocol Architecture has six layers.
  • Security is provided through the Wireless Transport Layer Security (WTLS)
  • WTLS provides authentication, privacy, and data integrity through the use of encryption and Message Authentication Codes (MAC)
  • WAP relies on block cipher algorithms that encrypt data
Cc99 Ff Dot
C. Wireless Local Area Networks (WLANs), IEEE 802.11
Cc99 Ff Dot
  • Security is provided through the Wired Equivalent Protocol (WEP)
  • WEP uses a single shared key common to all users of a WLAN layer
  • Encryption Keys can be recovered through analysis
  • IEEE 802.11i (TGi) is developing the new WLAN Security
Cc99 Ff Dot
Page 1 of 775
Next Page