Wireless Network Security

Only available on StudyMode
  • Download(s) : 178
  • Published : March 20, 2011
Open Document
Text Preview
Special Publication 800-48

Wireless Network Security
Tom Karygiannis Les Owens

802.11, Bluetooth and Handheld Devices

NIST Special Publication 800-48

Wireless Network Security
802.11, Bluetooth and Handheld Devices

Recommendations of the National Institute of Standards and Technology Tom Karygiannis and Les Owens

C O M P U T E R

S E C U R I T Y

Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2002

U.S. Department of Commerce

Donald L. Evans, Secretary
Technology Administration

Phillip J. Bond, Under Secretary for Technology
National Institute of Standards and Technology

Arden L. Bement, Jr., Director

W IRELESS NETWORK SECURITY

Note to Readers
This document is a publication of the National Institute of Standards and Technology (NIST) and is not subject to U.S. copyright. Certain commercial products are described in this document as examples only. Inclusion or exclusion of any product does not imply endorsement or non-endorsement by NIST or any agency of the U.S. Government. Inclusion of a product name does not imply that the product is the best or only product suitable for the specified purpose.

Acknowledgments
The authors wish to express their sincere thanks to numerous members of government, industry, and academia who have commented on this document. First, the authors wish to express their thanks to the staff at Booz Allen Hamilton who contributed to this document. In particular, their appreciation goes to Rick Nicholson, Brendan Goode, Christine Kerns, Sharma Aditi, and Brian Miller for their research, technical support, and contributions to this document. The authors express their appreciation to Bill Burr, Murugiah Souppaya, Tim Grance, Ray Snouffer, Sheila Frankel, and John Wack of NIST, for providing valuable contributions to the technical content of this publication. The authors would also like to express their thanks to security experts Russ Housley, Markus Jacobsson, Jan-Ove Larsson, Simon Josefsson, Stephen Whitlock, Brian Seborg, Pascal Meunier, William Arbaugh, Joesph Kabara, David Tipper, and Prashanth Krishnanmurthy for their valuable comments and suggestions. Finally, the authors wish to thank especially Matthew Gast, Keith Rhodes, and the Bluetooth Special Interest Group for their critical review and feedback during the public comments period. Contributions were also made by Rick Doten, Jerry Harold, Stephen Palmer, Michael D. Gerdes, Wally Wilhoite, Ben Halpert, Susan Landau, Sandeep Dhameja, Robert Moskowitz, Dennis Volpano, David Harrington, Bernard Aboba, Edward Block, Carol Ann Widmayer, Harold J. Podell, Mike DiSabato, Pieter Kasselman, Rick E. Morin, Chall McRoberts, and Kevin L. Perez.

i

W IRELESS NETWORK SECURITY

Table of Contents
Executive Summary ................................................................................................................. 1 1. Introduction ................................................................................................................... 1-1 1.1 1.2 1.3 1.4 2. 2.1 Authority ................................................................................................................ 1-1 Document Purpose and Scope .............................................................................. 1-1 Audience and Assumptions ................................................................................... 1-2 Document Organization ......................................................................................... 1-2 Wireless Networks ................................................................................................. 2-1 2.1.1 Wireless LANs ........................................................................................... 2-1 2.1.2 Ad Hoc Networks ....................................................................................... 2-1 Wireless Devices...
tracking img