Download presentation
Presentation is loading. Please wait.
Published byEsther Thornton Modified over 6 years ago
1
Security Issues in 11k Emily H. Qi Huai-An (Paul) Lin
January 2003 Security Issues in 11k Emily H. Qi Huai-An (Paul) Lin Intel Corporation Emily Qi, et al. Intel Corporation Emily Qi, et al. Intel Corporation
2
Security Alert WEP algorithm is only processed for the following frame bodies: Data frame Management frame with subtype authentication If management frames (Beacon, Probe, Probe Response) are used to communicate measurements between AP and STA, are there any security implications? Emily Qi, et al. Intel Corporation
3
Possible Security Attacks
Unauthorized party in the parking lot receives clear text of measurement and sniff the topology of network layout or usage Unauthorized party tampers with measurement to mislead network management Emily Qi, et al. Intel Corporation
4
Possible Security Services
Confidentiality Ensure that the measurement is accessible only for reading by authorized parties Integrity Ensure that only authorized parties are able to modify measurement. Modification includes writing, changing, changing status, deleting, creating, and delaying or replaying of measurement Authorization Authorize who knows what Emily Qi, et al. Intel Corporation
5
Suggested Work Items Study the possible security attack scenarios for RRM functional services Question: should TGk consider security issues (other than DOS)? requirements to TGi? what forms? Emily Qi, et al. Intel Corporation
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.