{"title":"用于企业802.11无线网络的分层安全架构","authors":"Y. M. Erten, E. Tomur","doi":"10.1109/WTS.2004.1319574","DOIUrl":null,"url":null,"abstract":"We investigate the security aspects of wireless local area networks and discuss the weaknesses associated with various conventional 802.11 security protocols such as WEP (wired equivalent privacy) and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using tested wired network components such as VPNs and firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.","PeriodicalId":242981,"journal":{"name":"2004 Symposium on Wireless Telecommunications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"A layered security architecture for corporate 802.11 wireless networks\",\"authors\":\"Y. M. Erten, E. Tomur\",\"doi\":\"10.1109/WTS.2004.1319574\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We investigate the security aspects of wireless local area networks and discuss the weaknesses associated with various conventional 802.11 security protocols such as WEP (wired equivalent privacy) and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using tested wired network components such as VPNs and firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.\",\"PeriodicalId\":242981,\"journal\":{\"name\":\"2004 Symposium on Wireless Telecommunications\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2004 Symposium on Wireless Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WTS.2004.1319574\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2004 Symposium on Wireless Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WTS.2004.1319574","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A layered security architecture for corporate 802.11 wireless networks
We investigate the security aspects of wireless local area networks and discuss the weaknesses associated with various conventional 802.11 security protocols such as WEP (wired equivalent privacy) and 802.1x. We propose an architecture to control access to corporate 802.11 wireless networks, based on the privileges and location of users, using tested wired network components such as VPNs and firewalls. The presented architecture reduces the security risks in enterprise level deployment of wireless LANs.