An Evaluation of the Recent IEEE 802.11ac Wireless Protocol – Term Paper Example

Download full paperFile format: .doc, available for editing

Therefore the main concern of the wireless networking systems, both the LAN and the WLAN is to device ways that can be used to install highest security to the networks and curb the malicious technologies that have been set to tamper with the information. There are ways of enabling security by enabling the public key authentication and encryption between the access points. This article therefore describes the possible methods that can be applied to the IEEE 802.11ac for security that is still underway. 3 Prior Research There has been a definition of security framework for 802.11 WLAN that has been done by the 802.11ac.

the security classes are two: 1. RSN Security: this is where a station is only capable to associate with RSNA with its RSN equipments. 2. Pre-RSN Security: this is a security that allows pre-RSNA associations between the stations. The pre-RSN security has two security subsystems that are used to define it. The IEEE 802 11 entity authentication: this is the type of security that has two types of authentications: I. An open system authentication: in this type of system there is no authentication algorithm.

The station used in this system is authenticated basing on its identity. This type of authentication permits a station to be authenticated by with no a correct WEP key. In this system there is an exchange of two messages from the mobile station who is also the supplicant to the authenticator (AP) which is used to describe the personality of the station. With the authenticator having the personality of the station, the result of the question can now be sent back from the authenticator to the station.

With this type of system, there is no authentication algorithm. II. Shared key authentication: this type of system has the stations authenticated using a personalized key that only the authentication requestor and the responder are familiar with it. In this type of authentication, there are four messages that are exchanged. The first message is sent to the authenticator from the station so that it can be identified. The reply to this message from the authenticator is a challenge that the station is supposed to encrypt using the WEP key and then send it back to the authenticator.

The station will only be able to encrypt the challenge correctly if the WEP key used will be correct. If the station is authenticated successfully, the authenticator will send the fourth message to the station. After the station has successfully been authenticated, it is now able to proceed to the 802.11ac association.


Adya, P., Bahl, J., Padhye, A., Wolman & Zhou, L. (2004). A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks. In IEEE International Conference on Broadband Networks (Broadnets).

Banerji, S. & Choudhury, S.R. (2013). “RECENT DEVELOPMENTS IN IEEE 802.11:

WLAN TECHNOLOGY”, International Journal of Mechatronics, Electrical and Computer Technology, Vol 3(9). 1001-1013.

Chandra, P. R., Bahl, & Bahl, P. (2004). MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card. InIEEE Infocom

Chung C. Chung T. Kang B. & Kim, J. (2013). “A-MPDU using Fragmented MPDUs

For IEEE 802.11ac MU-MIMO WLANs”, IEEE.

Fang, J. Tan K. Zhang, Y. Chen S. Shi L. Zhang J. & Tan Z. (2012). “Fine-Grained Channel

Access in Wireless LAN”, IEEE.

Herzel, G. F. & Gustat, H. (2003). An Integrated CMOS RF Synthesizer for 802.11a Wireless LAN. IEEE Journal of Solid-state Circuits, 18(10), October 2003.

Nguyan, K.D. Lanan, L. & Ochi H. (2013). “High Throughput– Resource Saving Hardware

Implementation of AES-CCM for Robust Security Network”, Journal of Automation and Control Engineering Vol. 1, No. 3, 250-254.

Ong H.E. Kneckt, J. & Chang Z. (2011). “IEEE 802.11ac: Enhancements for very high

throughput WLANs”, IEEE, 849-853.

Download full paperFile format: .doc, available for editing
Contact Us