Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]



Download 470.11 Kb.
View original pdf
Page32/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   28   29   30   31   32   33   34   35   ...   71
FULLTEXT01
ijsrp-p4303


Figure 7 802.1x Authentication Process (WPA2
)
Source: Embedded.com o Supplicant request access with AP. o Authenticator detects supplicant association and enables the supplicant’s port. o Port is forced into an unauthorized state to forward only x traffic (all other traffic is blocked. o The authenticator passes request to the authentication server. o The authentication server and client exchange authentication messages for server to verify supplicant’s identity. Mutual authentication is also possible, where supplicant is verifies the authentication server’s identity. o The authentication server instructs the authenticator via a RADIUS-ACCEPT message to let the supplicant onto the network if it has satisfied the authentication criteria. If not, an RADIUS-REJECT message is sent to the authenticator. o Upon receipt of the RADIUS-ACCEPT message, the authenticator transitions the supplicant port to an authorized state allowing the supplicant onto the network The initial 802.11 standard has undergone several revisions since it was ratified, through different task groups of the IEEE 802.11 Working Group (WG), to improve the technology and address security issues. In table 5 shown in the next page, I summarized the existing IEEE 802.11 family of standards.

Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude Arinze Sunday
- 19 -

Download 470.11 Kb.

Share with your friends:
1   ...   28   29   30   31   32   33   34   35   ...   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page