Security operates as a "trusted device" at the data-link layer
Device, not the user, is trusted
Authentication is based upon a shared key
Bluetooth is not an end-to-end security solution
B. Wireless Application Protocol (WAP)
WAP specification defines protocols at the Application, Session, and Transport layers
WAP Protocol Architecture has six layers.
Security is provided through the Wireless Transport Layer Security (WTLS)
WTLS provides authentication, privacy, and data integrity through the use of encryption and Message Authentication Codes (MAC)
WAP relies on block cipher algorithms that encrypt data
C. Wireless Local Area Networks (WLANs), IEEE 802.11
Security is provided through the Wired Equivalent Protocol (WEP)
WEP uses a single shared key common to all users of a WLAN layer
Encryption Keys can be recovered through analysis
IEEE 802.11i (TGi) is developing the new WLAN Security
Stay in the Know
Delivered right to your inbox, Aunt Minnie's newsletters. Subscribe to get exclusive access!
Comments
Post a Comment You must be signed in to leave a comment. To sign in or create an account, enter your email address and we'll send you a one-click sign-in link.