Exploration on SA Query Mechanism in IEEE 802.11w

Exploration on SA Query Mechanism in IEEE 802.11w

Yong Lu, Jingjing Liu, Lu Ning, Yi Huang
Copyright: © 2015 |Volume: 7 |Issue: 1 |Pages: 14
ISSN: 1941-8663|EISSN: 1941-8671|EISBN13: 9781466677296|DOI: 10.4018/ijitn.2015010102
Cite Article Cite Article

MLA

Lu, Yong, et al. "Exploration on SA Query Mechanism in IEEE 802.11w." IJITN vol.7, no.1 2015: pp.13-26. http://doi.org/10.4018/ijitn.2015010102

APA

Lu, Y., Liu, J., Ning, L., & Huang, Y. (2015). Exploration on SA Query Mechanism in IEEE 802.11w. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 7(1), 13-26. http://doi.org/10.4018/ijitn.2015010102

Chicago

Lu, Yong, et al. "Exploration on SA Query Mechanism in IEEE 802.11w," International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 7, no.1: 13-26. http://doi.org/10.4018/ijitn.2015010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Wireless communication has become increasingly popular due to development of internetworking. In this paper, the hidden security problems of IEEE802.11i in wireless LAN are presented. To solve them, the implementation of SA Query Mechanism of wireless devices is well-designed, based on Security Association (SA) Query mechanism proposed according to the IEEE 802.11w protocol. As to the reality, the implementation mentioned above is especially significant while plenty of wireless devices are lack of SA query mechanism, which is necessary in 802.11w protocol. In the last part, certain security risks of SA query mechanism are also discussed in this essay as supplementary.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.