Secure roaming in 802.11 networks / by Paul Goransson and Raymond Greenlaw.

Saved in:
Bibliographic Details
Main Author: Goransson, Paul
Other Authors: Greenlaw, Raymond
Format: eBook
Language:English
Published: Amsterdam ; Boston : Newnes/Elsevier, ©2007.
Series:Communications engineering series.
Subjects:
Online Access:Click for online access
Table of Contents:
  • Front Cover; Secure Roaming In 802.11 Networks; Copyright Page; Table of Contents; Preface; Acknowledgments; About the Authors; Chapter 1. Introduction; 1.1 Introduction; 1.2 Basic Networking Terminology and Conventions; 1.3 Setting the Scene; 1.4 Different Notions of Roaming; 1.5 Big Cells, Little Cells; 1.6 Authentication, Authorization, Accounting, and Roaming; 1.7 How Fast Do We Roam on the Range?; 1.8 Taxonomy for Roaming; 1.9 Organization of the Book; Chapter 2. Cellular Telephony: Wireless Roaming Pioneers; 2.1 Introduction; 2.2 The Future of Computing; 2.3 Basic Concepts
  • 2.4 Early History of Radio Telephony2.5 The Digital Revolution; 2.6 Soft Versus Hard Handoffs in Various Cellular Technologies; 2.7 The Quest for Convergence; 2.8 Summary; Chapter 3. Roaming in 802.11 WLANs:General Principles; 3.1 Introduction; 3.2 Primer on the 802.11 Standard; 3.3 Introduction to 802.11 Roaming; 3.4 Local Roaming; 3.5 Global Roaming; 3.6 Mobile IP and Its Role in 802.11 Roaming; 3.7 Those Pesky Laws of Physics; Chapter 4. Dynamics of 802.11 Task Groups; 4.1 Introduction; 4.2 Evolution of an IEEE Standard; 4.3 Battle for Speed, Cost, and Market Dominance
  • 4.4 The 802.11 Standard's Physical Layer4.5 Fast Secure Roaming Task Groups; 4.6 802.11i Security; 4.7 802.11e Quality of Service; 4.8 802.11k Radio Resource Measurement Enhancements; 4.9 802.11r Roaming; 4.10 Other 802.11 Subgroups; 4.11 Wi-Fi Alliance Versus IEEE 802.11; Chapter 5. Practical Aspects of Basic 802.11 Roaming; 5.1 Introduction; 5.2 The Driver and Client in an 802.11 Station; 5.3 Detailed Analyses of Real-Life Roams; 5.4 Dissection of a Global Roam; 5.5 Dissection of a Local Roam; 5.6 Access-Point Placement Methodologies; Chapter 6. Fundamentals of User Authentication in 802.11
  • 6.1 Introduction6.2 802.1X Port-Level Authentication; 6.3 The AAA Server; 6.4 The Extensible Authentication Protocol; 6.5 Flexible and Strong Authentication in 802.11; 6.6 Other 802.11 Authentication Methodologies; 6.7 Network Access Control; 6.8 Summary; Chapter 7. Roaming Securely in 802.11; 7.1 Introduction; 7.2 The 802.11 Security Staircase; 7.3 Preauthentication in 802.11i; 7.4 Detailed Analysis of Real-Life Secured Roams; 7.5 Dissection of a WPA-PSK Protected Roam; 7.6 Dissection of a WPA2 Enterprise Roam; 7.7 Dissection of an 802.11i Preauthentication; 7.8 Summary
  • Chapter 8. Optimizing Beyond the 802.11 Standard8.1 Introduction; 8.2 Voice over Wireless IP Roaming; 8.3 Opportunistic Key Caching; 8.4 Centralized Wireless Switch Architectures; Chapter 9. The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r Standard; 9.3 Detailed Concepts and Terminology of 802.11r; 9.4 Protocol Exchanges in 802.11r; 9.5 The 802.11k Standard Applied to Roaming; 9.6 Concluding Remarks; Chapter 10. Roaming between 802.11 and Other Wireless Technologies; 10.1 Introduction; 10.2 Ideal Roaming Experience