A Formal Policy Specification Language for an 802.11 WLAN with Enhanced Security Network
نویسندگان
چکیده
In Wide Area Networks (WANs)inconsistencies among the security policies of Administrative Domains (ADs) may cause severe security flaws. Recently, security policies are written in natural language and as they get more complicated, even for an expert it might be impossible to detect such inconsistencies. However, when a formal language is used, it might be possible to make verification of security policies by automated theorem proving tools. Due to the existence of mobile devices such as laptops, PDAs and mobile agents, we need a formal language that is capable of defining the concept of mobility. In this paper, we extend Mobadtl [1] according its refinement methodology to obtain a formal policy specification language for an 802.11 WLAN with enhanced security network.
منابع مشابه
On Securing Wireless LANs and Supporting Nomadic Users with Microsoft’s IPSec Implementation
Wireless LANs, like the IEEE 802.11 WLANs, are more vulnerable than their wired counterparts. The IEEE 802.11 specification includes an encryption protocol, WEP (Wired Equivalent Protocol), but this protocol inhibits severe weaknesses: there is no automatic key distribution protocol and WEP’s security itself has been shown to be seriously flawed. As a result, many of today’s IEEE 802.11 network...
متن کاملEvaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach
In this paper, we have focus existing and proposedWLAN security technologies designed to improve 802.11 standard by applying security policies. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics by applying security policy to individual packet. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN test bed archit...
متن کاملFormal specification, verification and correction of security policies based on the decision tree approach
Security components such as firewalls, IDS and IPS, are the mainstay and the most widely adopted technology for protecting networks. These security components are configured according to a global security policy. An error in a security policy either creates security holes that will allow malicious traffic to sneak into a private network or blocks legitimate traffic and disrupts normal business ...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملDual-Band Evanescent-Mode Substrate Integrated Waveguide Band-pass Filter for WLAN Applications
A new multi-layer substrate integrated waveguide (SIW) structure is developed to design dual-band evanescent-mode band-pass filters (BPFs). Two independent series LC circuits are implemented by incorporating metallic irises in the different layers of the structure. The combination of the metallic irises with capacitive-plates is embedded inside the SIW to independently excite two evane...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005