The paper documents the authentication mechanisms in a wireless network like Open system, shared key, WPA, 802.1x etc. The detailed functionality analysis of the mechanisms are researched and documented. A comparative study of WEP and WPA along with the weaknesses are identified. Security vulnerabilities with WEP and how it is mitigated with 802.11i is understood. Flavors of WPA like WPA – Personal and WPA- Enterprise is documented. WPA and TKIP key derivation
method is explained in detail with diagrams. Mac-based authentications and associated security issues are analyzed. The different types of 802.1x authentication protocols, packet flows, key derivation mechanisms and associated vulnerabilities are documented. Radius vulnerabilities are analyzed in depth.
Pages – 29
Price – $150
You can request for a document preview before purchase. We shall send you one page of the paper for review before purchase.
Email us to buy or preview the paper Click Here to email