Professional Documents
Culture Documents
11i 227
generate the PSK. Mutual authentication is performed using PSK. The key is
derived from the user credentials that have been entered in the AP.
STA# j AP# l AS
Figure 9-19. Relative position of master key (MK), pairwise master key (PMK), and
pairwise transient key (PTK) in IEEE 802.11i.
TEAM LinG
228 SECURITY IN WIRELESS DATA NETWORKS
STA AP AS
EAP-TLS
EAP
TEAM LinG
SECURITY IN CELLULAR NETWORKS 229
STA AP AS
Capabilities discovery
Data encryption
In terms of data security, cellular networks pose a scenario quite different from
WLANs. Due to wide area roaming capability and international market for
operators, the network interoperability requirement and export constraints for
security algorithms make a unique paradox. With the all-IP based networks,
TEAM LinG