A CM-based model for 802.11 networks security policies enforcement
Karl Mabiala Dondia, Jing Ma, Feng Tao
Karl Mabiala Dondia
Available Online April 2015.
- https://doi.org/10.2991/amcce-15.2015.288How to use a DOI?
- Wireless LAN; IEEE 80211 standards; Continuous Monitoring; security policy
- In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is due to the “plug-and-play” nature of the technology and the mobility. The lack of physical containment due to the inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines, via continuous monitoring, various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The primary goal is to identify the key components of an effective wireless security policy.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Karl Mabiala Dondia AU - Jing Ma AU - Feng Tao PY - 2015/04 DA - 2015/04 TI - A CM-based model for 802.11 networks security policies enforcement BT - 2015 International Conference on Automation, Mechanical Control and Computational Engineering PB - Atlantis Press SN - 1951-6851 UR - https://doi.org/10.2991/amcce-15.2015.288 DO - https://doi.org/10.2991/amcce-15.2015.288 ID - Dondia2015/04 ER -