References
For additional insight on wireless LAN security fundamentals, consult the books, RFCs, standards, white papers, and technical documentation listed in the sections that follow.
Books on WLANs, WLAN Security, and General Network Security
- Shankar, K., Sundaralingam, S., Balinsky, A., and Miller, D. Cisco Wireless LAN Security. Indianapolis, Indiana: Cisco Press; 2005.
- Fleck, B. and Potter, B. 802.11 Security. Cambridge, Massachusetts: O'Reilly; 2002.
- Edney, J. and Arbaugh, W. Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Reading, Massachusetts: Addison-Wesley; 2003.
- Flickenger, R. Wireless Hacks. Cambridge, Massachusetts: O'Reilly; 2003.
- Vladimirov, A.A., Gavrilenko, K.V., and Mikhailovsky, A.A. Wi-Foo: The Secrets of Wireless Hacking. Reading, Massachusetts: Addison-Wesley Professional; 2004.
- Peikari, C. and Fogie, S. Maximum Wireless Security. Indianapolis, Indiana: Sams Publishing; 2002.
- Swaminatha, T.M. and Elden, C.R. Wireless Security and Privacy: Best Practices and Design Techniques. Reading, Massachusetts: Addison-Wesley; 2002.
- Roshan, P. and Leary, J. 802.11 Wireless LAN Fundamentals, Indianapolis, Indiana: Cisco Press; 2003.
- Convery, S. Network Security Architectures. Indianapolis, Indiana: Cisco Press; 2004.
- Kaeo, M. Designing Network Security. Indianapolis, Indiana: Cisco Press; 1999.
- O'Hara, B. and Petrick, A. IEEE 802.11 Handbook. Piscataway, New Jersey: IEEE Press; 2005.
Relevant RFCs and Standards Documentation
- RFC 2196, "Site Security Handbook." Fraser, B. IETF. ftp://ftp.rfc-editor.org/in-notes/rfc2196.txt. September 1997.
- RFC 3579, "RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)." Aboda, B. and Calhoun, P. IETF. ftp://ftp.rfc-editor.org/in-notes/rfc3579.txt. September 2003.
- RFC 3748, "Extensible Authentication Protocol (EAP)." Aboda, B., Blunk, L., Vollbrecht, J., Carlson, J., and Levkowetz, H. IETF. ftp://ftp.rfc-editor.org/in-notes/rfc3748.txt. June 2004.
- "Wi-Fi Protected Access: Strong, standards-based, interoperable security for today's Wi-Fi networks." www.wi-fi.org/membersonly/getfile.asp?f=Whitepaper_Wi-Fi_Security4-29-03.pdf. Wi-Fi Alliance. April 2003.
- "Deploying Wi-Fi Protected Access (WPA™) and WPA2™ in the Enterprise." www.wi-fi.org/membersonly/getfile.asp?f=WFA_02_27_05_WPA_WPA2_White_Paper.pdf. Wi-Fi Alliance. March 2005.
White Papers on WLAN Security
- "SAFE: Wireless LAN Security in Depth—version 2." Convery, S., Miller, D., Sundaralingam, S., et al. www.cisco.com/en/US/partner/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a008009c8b3.shtml.
- "Wireless LAN Security White Paper." www.cisco.com/en/US/partner/products/hw/wireless/ps430/products_white_paper09186a00800b469f.shtml.
Technical Documents Describing WEP Flaws
- "An Inductive Chosen Plaintext Attack Against WEP/WEP2." Arbaugh, W.A. Submission to the IEEE-802.11. doc# IEEE 802.11-01/230. www.cs.umd.edu/~waa/attack/v3dcmnt.htm. May 2001.
- "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions." Bellardo, J. and Savage, S. Proceedings of the USENIX Security Symposium, Washington, D.C. www.cs.ucsd.edu/users/savage/papers/UsenixSec03.pdf.
- "Intercepting Mobile Communications: The Insecurity of 802.11." Borisov, N., Goldberg, I., and Wagner, D. 7th Annual Conference of Mobile Computing and Networking. July 2001.
- "Weaknesses in the Key Scheduling Algorithm of RC4." Fluhrer, S., Mantin, I., and Shamir, A. In Proc. 8th Workshop on Selected Areas in Cryptography. LNCS 2259. www.crypto.com/papers/others/rc4_ksaproc.ps. Springer-Verlag. 2001.
- "Using the Fluhrer, Mantin, and Shamir Attack to Break WEP, Revision 2." Stubblefield, A., Ioannidis, J., and Rubin, A.D. AT&T Labs. www.uninett.no/wlan/download/wep_attack.pdf. August 21, 2001.
- "Unsafe at Any Key Size: An Analysis of the WEP Encapsulation." Walker, J. IEEE doc# 802.11-00/362. October 2000.