scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Will IEEE 802.1X Finally Take Off in 2008

01 Mar 2008-IEEE Computer (IEEE)-Vol. 41, Iss: 3, pp 12-15
TL;DR: This presentation explains how an authentication technology called IEEE 802.1X provides a security framework by letting PCs, Internet phones, and other devices connect to a LAN only if they can authenticate themselves prior to network access.
Abstract: Security is always a key concern for network operators. They are thus always looking for effective new security tools to work with. Eight years ago, an authentication technology called IEEE 802.1X was supposed to be an important tool for local area networks. 802.1X provides a security framework by letting PCs, Internet phones, and other devices connect to a LAN only if they can authenticate themselves prior to network access. Despite its promise, IEEE 802.1X has never been widely adopted, although it has been used increasingly for wireless gateway-access controls.

Content maybe subject to copyright    Report

Citations
More filters
Patent
24 Oct 2012
TL;DR: In this article, the authors propose a method for authorization determination based on a first user profile of the plurality of user profiles, where the first profile includes the identifier associated with the client system.
Abstract: In one embodiment, a method includes receiving a request at a wireless access point from a client system to access a network through the wireless access point. The wireless access point sends an identifier associated with the client system to a social-networking system, the social-networking system including user profiles arranged in one or more social graphs. The social graphs store relationships between the user profiles. The method further includes receiving at the wireless access point from the social-networking system an authorization determination. The authorization determination is based upon a first user profile of the plurality of user profiles. The first user profile includes the identifier associated with the client system. The method further includes providing the client system with access to the network through the wireless access point in accordance with the authorization determination.

86 citations

Book ChapterDOI
30 May 2009
TL;DR: The use of Software Agents in quantum cryptography based key distribution in WiFi wireless networks is discussed and it can be seen that these processes can be implemented efficiently using Software Agents.
Abstract: Security in WiFi networks has become a major concern as the wireless networks are vulnerable to security threats than wired networks The 80211i wireless networks uses 4 way handshake protocol to distribute the key hierarchy in order to encrypt the data communication In our previous research work [2], we have discussed the use of Quantum Key Distribution (QKD), for key distribution in 80211 wireless networks The whole communication flow of our proposed protocol can be split into several key processes It can be seen that these processes can be implemented efficiently using Software Agents In this paper we shall discuss the use of Software Agents in quantum cryptography based key distribution in WiFi wireless networks

12 citations

Proceedings ArticleDOI
27 May 2011
TL;DR: This research has proposed a novel cost effective authentication framework for Wireless LAN in SMEs that is simple, as well as lightweight and does not consume huge processing cycles.
Abstract: Security is an issue that requires more attention in wireless communication due to the extreme flexible access offered by this technology. Wireless LAN has gained popularity in enterprises cause of the same reason the security mechanisms offered for Wireless LAN are expensive (normally require high processing and extra hardware), complex (based upon private and public cryptography and have their own weaknesses (key length issues, inherent issues of cryptographic algorithms) the financial constraints of small medium enterprises (SMEs) do not allow them to implement such expensive security solutions. In our research, we have proposed a novel cost effective authentication framework for Wireless LAN in SMEs. It is simple, as well as lightweight and does not consume huge processing cycles. It also does not require any additional hardware.

1 citations


Cites background from "Will IEEE 802.1X Finally Take Off i..."

  • ...transmitted or received over Wireless links can be intercepted [ 5 ]....

    [...]

  • ...• IEEE 802.Ix Standard: 802.lx [3, 5 , 17, 19] is a port based authentication protocol, implemented at the first point of connection to the network....

    [...]

Journal Article
TL;DR: In this paper, a penetration test of WLANs of IES de Belo Horizonte and of cidades do interior de MinhasGerais proximas da capital is presented.
Abstract: A demanda por mobilidade e disponibilidade de acesso a informacao por dispositivos como Smatphones , Tables e Notebooks massificou o uso de redes Wi-Fi (IEEE 802.11) em amabientes diversos como em Instituicoes de Ensino Superior (IES). Com as redes Wi-Fi, surgiram novos riscos aos usuarios e as instituicoes que proveem esse tipo de rede. Esta pesquisa teve como objetivo analisar, por meio de um Teste de Penetracao ( Pentesting ), as vulnerabilidades e ameacas presentes nas redes Wi-Fi de IES de Belo Horizonte e de cidades do interior de MinhasGerais proximas da capital. Inicialmente, levantou-se, por meio de uma pesquisa bibliografica, a evolucao do padrao de rede 802.11, seus mecanismos de seguranca e as principais vulnerabilidades existentes nessa arquitetura. Realizou-se teste experimental in loco em 12 instituicoes participantes. Os resultados mostraram que a infraestrutura das redes Wi-Fi das IES sao muito diversificadas e que uma porcentagem significativa dessas WLANs se encontra vulneravel e pode ser ameacada por usuarios maliciosos, trazendo riscos, o que coloca em risco o ambiente academico e seus usuarios. A analise dos resultados revelou que mudancas pontuais e de baixo custo podem aprimorar a seguranca dessas redes. Palavras-chave - Wi-Fi, IEEE 802.11, penetration test , analise de vulnerabilidades, seguranca da informacao.

1 citations

Patent
21 Jun 2008
TL;DR: In this article, an adaptation layer (ANP) is added to a FlexRay(RTM: automotive network communications protocol) bus system to change information in a physical Ethernet format into information in an automotive network format by an ANP.
Abstract: The system has a set of network nodes connected with one another. Information in a physical Ethernetformat is changed into information in a physical FlexRay(RTM: automotive network communications protocol) format by an adaptation layer (ANP). The information in the physical FlexRay(RTM: automotive network communications protocol) format is transmitted from one of the nodes to another node over a physical FlexRay(RTM: automotive network communications protocol) layer (FRP) of a FlexRay(RTM: automotive network communications protocol) bus system.