Wireless LAN Security Enhancement through Trusted Computing Technology

Article Preview

Abstract:

Wireless communication can provide ubiquitous access to the Internet and more convenience than wired communication. Due to the wide open nature of wireless radio, security over a wireless environment is more complicated. From the initial IEEE 802.11 to IEEE 802.11i, more robust security methods have been adopted to eliminate underlying attacks. IEEE 802.11i is based on the assumption that all participants are honest that they will act as they are expected. But usually it is not true. How to recognize a genuine user, how to keep authentication data safely, and how to prevent dishonest supplicant accessing WLAN are big challenges. Trusted Computing can be used to improve security status of endpoint. Applying Trusted Computing technology can solve these challenges and enhance WLAN security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

986-989

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] IEEE Std. 802. 11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, (1999).

DOI: 10.1109/ieeestd.1997.85951

Google Scholar

[2] IEEE Std. 802. 11i-2004, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 6: Medium Access Control (MAC) Security Enhancements, July (2004).

DOI: 10.1109/ieeestd.2004.94585

Google Scholar

[3] IEEE Std. 802. 1X-2001, Local and Metropolitan Area Networks-Port-Based Network Access Control, June (2001).

Google Scholar

[4] Chen Jyh Cheng, Jiang Ming Chia, Liu Y I W. Wireless LAN Security and IEEE 802. 11i., IEEE Wireless Communications, December (2005).

DOI: 10.1109/mwc.2005.1404570

Google Scholar

[5] Bruce Potter, Wireless Security's Future, IEEE Security and Privacy, Vol1, No. 4,   July-August, (2003).

Google Scholar

[6] AruneshMishra, Nick L. Petroni Jr., WilliamA. Arbaugh, Timothy Fraser, Security issues in IEEE 802. 11 wireless local area networks: a survey: Research Articles., Wireless Communications & Mobile Computing. Vol4 ,  Issue 8, December (2004).

DOI: 10.1002/wcm.257

Google Scholar

[7] Trusted Computing Group. TCG Specification Architecture Overview https: /www. trustedcomputinggroup. org/ groups/TCG_1_0_Architecture_Overview. pdf.

Google Scholar

[8] Huanguo Zhang, Jie Luo, Gang Jin, Fajiang Yu, Fei Yan. A survey of Trusted Computing., Wuhan University Journal of Natural Science, Vol11, No. 6, December (2006).

DOI: 10.1007/bf02831786

Google Scholar

[9] Trusted Computing Group. Trusted Platform Module (TPM) Specifications https: /www. trustedcomputinggroup. org/specs/TPM/Main_Part1_Rev94. zip.

Google Scholar