802.11 Wireless Networks: The Definitive GuideAs we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain. The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start. This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:
|
From inside the book
Results 1-3 of 42
... attacks are focused on a class of weak keys written in the form ( B + 3 ) : FF : N . Each weak IV is used to attack a particular byte of the secret portion of the RC4 key . Key bytes are numbered from zero . Therefore , the weak IV ...
... attack discussed in Chapter 5 . To mitigate the attacks against initialization vectors , TKIP doubles the length of ... attack . Successful application of the principles of the attack require a collection of " weak keys " with the same ...
... attack , which I refer to as the gathering time . Second , a successful attack must be run against the stored frames , which I refer to as the analysis time.t In my experience , the time required to gather enough data to mount the attack ...
Contents
Introduction to Wireless Networking | 1 |
Overview of 802 11 Networks | 12 |
Wired Equivalent Privacy WEP | 114 |
Copyright | |
16 other sections not shown
Other editions - View all
802.11 Wireless Networks: The Definitive Guide: The Definitive Guide Matthew S. Gast Limited preview - 2005 |