This report provides readers with a detailed explanation of next generation 802.11 wireless security. It describes the inherently flawed Wired Equivalent Privacy (WEP) and explains 802.11i's two-step approach (interim and long-term)to providing effective wireless security. It describes secure methods used to authenticate users in a wireless environment, and presents several sample case studies of wireless deployment. It also includes guidance on best practices for establishing secure wireless networks using the emerging Wi-Fi technology.
Citation: Special Publication (NIST SP) - 800-97
NIST Pub Series: Special Publication (NIST SP)
Pub Type: NIST Pubs
IEEE 802.11, network security, Wi-Fi, wireless local area network, wireless networking