General security analysis of an it configuration based on wlan

Thijs Veugen, Sander Degen

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Abstract

This chapter presents a structured overview of security threats and attacks for WLAN and security services that can be used to overcome or reduce these threats. When analyzing the security of a specific technology, it is important to consider a complete system that uses this technology because it is not only the technology that causes security threats but how it is used in practice within a complete system. One can try to perfectly secure the WLAN, but when the network and applications that use WLAN are not sufficiently secure, the complete system will be insecure. In general, security is just as strong as the weakest link in the communication chain. For example, what is the use of encrypting WLAN messages when they are transmitted in plaintext over the Internet through an access point? Hence, to achieve end-to-end security, the communication link has to be secured up to the application level.

Original languageEnglish
Title of host publicationHandbook of Wireless Local Area Networks
Subtitle of host publicationApplications, Technology, Security, and Standards
PublisherCRC Press/Balkema
Pages459-477
Number of pages19
ISBN (Electronic)9780203492512
ISBN (Print)9780849323232
Publication statusPublished - 1 Jan 2005
Externally publishedYes

Keywords

  • n/a OA procedure

Fingerprint

Dive into the research topics of 'General security analysis of an it configuration based on wlan'. Together they form a unique fingerprint.

Cite this