Provided by: Science and Development Network (SciDev.Net)
Date Added: Jun 2012
As wireless technology widely spreads and invites its development with changes in wireless network system which supports rapid transmission, defects in security are, however, constantly witnessed. As a result, these problems have called for the needs to strengthen the hole in the technology. Though it seems that security issues between wireless communication are solved with the adoption of IEEE 802.11i as a standard, numerous attacks targeted for vulnerability of wireless mobile are increasing these days. When accesses to wireless AP from server-based, or client-based authentication, either of them determines an authorization status for use. A number of measures to prevent external attacks or information leakages are presented through the use of authorized wireless AP.