管理员
无线论坛管理员
- 注册时间
- 2004-10-2
- 金币
- 35286 个
- 威望
- 404 个
- 荣誉
- 114 个
累计签到:119 天 连续签到:3 天 [LV.200]无线新星
|
发表于 2007-7-15 13:41
<p><strong><font color="#3300ff" size="5">英文资料</font></strong></p><p><strong><font color="#ff0000">40.</font><a href="http://www.anywlan.com/documents/2007/494.html"><font color="#ff0000">An OnDemand Secure Routing Protocol Resilient to Byzantine Failures</font></a></strong></p><p>ABSTRACT:An ad hoc wireless network is an autonomous self-organizing system of mobile nodes connected by wireless links where nodes not in direct range can communicate via intermediate nodes. A common technique used in routing protocols for ad hoc wireless networks is to establish the routing paths ondemand, as opposed to continually maintaining a complete routing table. A signi cant concern in routing is the ability to function in the presence of byzantine failures which include nodes that drop, modify, or mis-route packets in an attempt to disrupt the routing service.<br/>We propose an on-demand routing protocol for ad hoc wireless networks that provides resilience to byzantine failures caused by individual or colluding nodes. Our adaptive probing technique detects a malicious link after log n faults have occurred, where n is the length of the path. These links are then avoided by multiplicatively increasing their weights and by using an on-demand route discovery protocol that nds a least weight path to the destination.</p><p><strong>41.<a href="http://www.anywlan.com/Article/2007/200707/2501.html"><font color="#ff0000">Wireless Attacks and Penetration Testing</font></a></strong></p><p>无线攻击和渗透测试技术的介绍性文章。</p><p><strong>42.<a href="http://www.anywlan.com/Article/2007/200707/2502.html"><font color="#ff0000">Wireless Honeypot Countermeasures</font></a></strong></p><p>无线蜜罐技术的介绍性文章。</p><p><strong>43.<a href="http://www.anywlan.com/documents/2007/520.html"><font color="#ff0000">Wireless 802.11 LAN Security Understanding the Key Issues</font></a></strong></p><p>The rapid deployment of wireless LANs is testimony to the inherent benefits of this technology. Unfortunately, most wireless deployments are, at this time, fundamentally insecure. This is not an exaggeration. Based on our work with a wide range of organizations, it is an accurate assessment of the reality of the current state of the security of wireless 802.11-based environments.<br/>This situation is caused by two overarching problems. First, the technology itself is new and immature. Second, the technology is deceptively simple. Deploying a wireless environment is fundamentally easy. Deploying a wireless environment that meets the requirements of your existing security policies, while minimizing business risk, is not. It can be done, but requires substantial planning and a commitment to address a number of significant architectural,implementation, and operational issues.<br/>Wireless LAN deployment has clearly not yet reached its potential. But, the pundits are wrong on one essential point. They look at the deficiencies of the technology and think that organizations shouldn’t be deploying it yet. The pundits miss the plain fact that rganizations are deploying it anyway. Further, wireless LANs are a stealth technology. Most IT departments in large organizations are significantly underestimating how much wireless has already been installed by enterprising departments as well as individuals.<br/>While there is no substitute for practical experience with a new technology, this brief white paper is intended to help you understand the breadth of issues that need to be dealt with and to offer advice on how to avoid some of the most common mistakes. Let’s take a look at some of the security issues.</p><p><strong>44.<a href="http://www.anywlan.com/documents/2007/514.html"><font color="#ff0000">Fixing WEP Robust Security Networks with 802.11i</font></a></strong></p><p>Soon after the huge success of Wireless LANs their lack of security became obvious. After several years, nally an industry standard, IEEE 802.11i, has been completed to provide robust security.This essay outlines the basics of Wireless LANs and describes the mechanisms for authentication,key management, integrity protection and con dentiality in robust security networks.</p><p><strong>45.<a href="http://www.anywlan.com/documents/2007/519.html"><font color="#ff0000">Wireless Local Area Network (WLAN) Security_802.11i</font></a></strong></p><p></p><p>Wireless Networks are growing at an explosive rate. Along with the growth, come the security problems. Wireless networks are easy to break into due to the broadcast nature of the medium. IEEE 802.11 standard has made significant steps in providing a comprehensive solution to make the security of wireless networks comparable to wired networks. Current IEEE 802.11a, b, g standards use WEP protocol which has a lot of known flaws and even the interim security solution, WPA, does not meet the requirements for some users. Hence IEEE is has developed a new standard, IEEE 802.11.i that includes the WPA and RSN protocols. This paper describes the WEP & WPA protocols and different vulnerabilities of these standards. It then gives an overview of IEEE 802.11i standard, showing how the new 802.11 addendum plans to solve the wireless network security problem.</p><p><strong>46.<a href="http://www.anywlan.com/documents/2007/515.html"><font color="#ff0000">IEEE 802.11i Standard Improves Wireless LAN Security</font></a></strong></p><p>目录:<br/>IEEE 802.11I STANDARD IMPROVES WIRELESS LAN SECURITY<br/>OVERVIEW: THE PLANET IS GOING WIRELESS<br/>FUNDAMENTAL WIRELESS SECURITY CHALLENGES <br/>ORIGINAL 802.11 SECURITY WAS FLAWED<br/>802.11I TAKES STEPS TO IMPROVE SECURITY<br/>INDEPENDENT REVIEW<br/>CHALLENGES AHEAD<br/>ENCOURAGING WORLDWIDE ACCEPTANCE<br/>SUMMARY <br/>AUTHOR BIO </p><p>47.<a href="http://www.anywlan.com/documents/2007/517.html"><font color="#ff0000"><strong>Security Analysis and Improvements for IEEE 802.11i</strong></font></a></p><p>This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model, 802.11i appears to provide effective data confidentiality and integrity when CCMP is used.<br/>Furthermore, 802.11i may provide satisfactory mutual authentication and key management, although there are some potential implementation oversights that may cause severe problems. Since the 802.11i design does not emphasize availability, several DoS attacks are possible. We review the known DoS attacks on unprotected management frames and EAP frames, and discuss ways of mitigating them in 802.11i. The practicality of a DoS attack against Michael MIC Failure countermeasure is discussed and improvements are proposed. Two new DoS attacks and possible repairs are identified: RSN IE Poisoning and 4-Way Handshake Blocking. Finally some tradeoffs in failure-recovery strategies are discussed and an improved variant of 802.11i is proposed to address all the discussed vulnerabilities.</p><p>48.<a href="http://www.anywlan.com/documents/2007/516.html"><strong><font color="#ff0000">Secure Authentication System for Public WLAN Roaming</font></strong></a></p><p>A serious impediment for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relationships with individuals and each supporting their own authentication schemes which may vary from one provider to the next. We have designed and implemented a comprehensive single sign-on (SSO) authentication architecture that confederates WLAN service providers through trusted identity providers. Users select the appropriate SSO authentication scheme from the authentication capabilities announced by the WLAN service provider, and can block the exposure of their privacy information while roaming. In addition, we have developed a compound layer 2 and Web authentication scheme that ensures cryptographically protected access while preserving pre-existing public WLAN payment models. Our experimental results, obtained from our prototype system, show the total authentication delay are well within 2 seconds. This is dominated primarily by our use of industrystandard XML-based protocols, yet are still small enough for practical use.</p><p><strong><font color="#ff0000">49.</font></strong><a href="http://www.anywlan.com/documents/2007/518.html"><strong><font color="#ff0000">TinySec: A Link Layer Security Architecture for Wireless Sensor Networks</font></strong></a></p><p><strong><font color="#ff0000">50.</font><a href="http://www.anywlan.com/documents/2007/525.html"><font color="#ff0000">家居无线网络的安全</font></a></strong></p><p>Introduction to Wireless Network<br/>Wireless LAN Security Risks<br/>Wireless LAN Basic Defense Strategies</p>
[此贴子已经被作者于2007-7-29 1:07:23编辑过] |
|