Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
Sheila E. Frankel, Bernard Eydt, L Owens, Karen Kent Scarfone
This report provides readers with a detailed explanation of next generation 802.11 wireless security. It describes the inherently flawed Wired Equivalent Privacy (WEP) and explains 802.11i's two-step approach (interim and long-term)to providing effective wireless security. It describes secure methods used to authenticate users in a wireless environment, and presents several sample case studies of wireless deployment. It also includes guidance on best practices for establishing secure wireless networks using the emerging Wi-Fi technology.