802.11i
- 無線網路安全 - 主講人:郭文光助理教授
- Wi-Fi security – WEP, WPA and WPA2
- Fast, Secure Handovers in 802.11: Back to the Basis
- 802.11 Security
- 無線網路安全技術之分析與偵測分析系統之設計與實現
- Wi-Fi security – WEP, WPA and WPA2
- Wireless lan security
- WEP(Wireless Equivalency Protocol)
- WPA
- The WPA protocol implements the majority of the IEEE 802.11i standard.
- Wi-Fi Protected Access (WPA) Overview
- 802.11i/WPA2
- WPA2
- Pre-Authentication
- CCMP(Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
- 802.11i- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer specifications
- The later WPA2 certification mark indicates compliance with the full IEEE 802.11i standard.
- EAP(Extensible Authentication Protocol)
- 802.1X
- EAPOL(EAP over LAN)/802.1X
- 802.1X Client
- RSNA(Robust Security Network Associations)
- Agreeing on the security policy
- 802.1x authentication
- Key hierarchy and distribution
- RSNA data confidentiality and integrity
- IEEE Std 802.1X-2004 IEEE Standard for Local and metropolitan area networks and Port-Based Network Access Control
- RFC4017 - Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs
- 802.1X Port-Based Authentication HOWTO
- 802.1X协议的工作机制流程详解
- Wi-Fi Authentication Demystified
- Uncontrolled and Controlled Ports
- WPA/WPA2 Key Management
- Pairwise mater key(PMK)
- Pairwise transient key(PTK)
- Data Encryption key (128 bits)
- Data Integrity key (128 bits)
- EAPOL-Key Encryption (128 bits)
- EAPOL-Key Integrity key (128 bits)
- Group keys
- The access point chooses a 256-bit cryptographic-quality random number. That number becomes the GMK or group master key.
- The GMK is used to create the Group Encryption Key (128 bits) and the Group Integrity Key (128 bits.)
- The keys are combined to create GTK or group transient key.
page revision: 157, last edited: 20 Feb 2012 05:56