Term
|
Definition
| A wireless network that does not use an access point. Also known as peer-topeer mode or Independent Basic Service Set (IBSS). |
|
|
Term
| ATIM (Ad hoc Traffic Indication Message) window |
|
Definition
| A specific period of time at which each ad hoc device must be awake. |
|
|
Term
|
Definition
| The process of being accepted into the wireless network. |
|
|
Term
|
Definition
| A process in which the AP accepts or rejects a wireless device. |
|
|
Term
|
Definition
| A server on an IEEE 802.1x network that verifies the authentication of devices. |
|
|
Term
|
Definition
| The geographical area of coverage for a WLAN. |
|
|
Term
|
Definition
| A group of wireless devices that is served by a single access point (AP). |
|
|
Term
|
Definition
| The process of an AP in an infrastructure network or wireless device in an ad hoc network sending a beacon frame to both announce its presence and to provide the necessary information for other devices to join the network. |
|
|
Term
|
Definition
| The process of an access point temporarily storing frames for wireless devices that are asleep. |
|
|
Term
|
Definition
| An attack in which an attacker attempts to create every possible key combination by systematically changing one character at a time in a possible key. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| In wireless security, two packets that were created from the same initialization vector (IV). |
|
|
Term
|
Definition
| A person who has been hired to break into a computer and steal information. |
|
|
Term
|
Definition
| A person who violates system security with malicious intent. |
|
|
Term
|
Definition
| The science of transforming information so that it is secure while it is being transmitted or stored. |
|
|
Term
|
Definition
| Terrorists who attack networks and computer infrastructures in order to cause panic. |
|
|
Term
| CRC (Cyclic Redundancy Check) |
|
Definition
| A checksum value that is based on the contents of the text. |
|
|
Term
|
Definition
| A new IP address on a foreign network. |
|
|
Term
| CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) |
|
Definition
| A protocol designed to avoid collisions on a wireless medium. |
|
|
Term
| CSMA/CD (Carrier Sense Multiple Access with Collision Detection) |
|
Definition
| A contention-based channel access method used by 802.3 Ethernet networks. |
|
|
Term
|
Definition
| The process of listening on a network medium prior to transmitting. |
|
|
Term
|
Definition
| A block of text that must be encrypted by a wireless device in shared key authentication. |
|
|
Term
|
Definition
| Different ways of sharing a network medium. |
|
|
Term
|
Definition
| A channel access method in which devices compete with each other to use the network medium. |
|
|
Term
| DCF (Distributed Coordination Function) |
|
Definition
| An IEEE 802.11 standard for sharing the wireless medium. |
|
|
Term
| DIFS (Distributed Coordination Function IFS) |
|
Definition
| An interframe space that is the standard interval between the transmission of data frames. |
|
|
Term
|
Definition
| A key value that is used to encrypt wireless data transmissions when they are sent. |
|
|
Term
| DoS (Denial of Service) attack |
|
Definition
| An attack that attempts to make a server or other network device unavailable by flooding it with requests. |
|
|
Term
|
Definition
| An attack that takes each word from a dictionary and encodes it in the same way a passphrase was encoded. |
|
|
Term
| ESS (Extended Service Set) |
|
Definition
| Two or more BSS networks that are connected through a common distribution system. |
|
|
Term
|
Definition
| A forwarding mechanism in Mobile IP. |
|
|
Term
|
Definition
| Another network on a Mobile IP service. |
|
|
Term
|
Definition
| A wireless device that can be seen by an access point but not by all other wireless devices. |
|
|
Term
|
Definition
| A forwarding mechanism in Mobile IP that keeps track of where a mobile computer is located. |
|
|
Term
| IBSS (Independent Basic Service Set) |
|
Definition
| A wireless network that does not use an access point. Also known as ad hoc or peer-to-peer mode. |
|
|
Term
|
Definition
| A group of wireless devices that is served by a single access point (AP). |
|
|
Term
|
Definition
| The value that an algorithm uses to encrypt or decrypt a message. |
|
|
Term
|
Definition
| The output from a pseudo-random number generator (PRNG). |
|
|
Term
|
Definition
| An attack method to determining the keystream by analyzing two packets that were created from the same initialization vector (IV). |
|
|
Term
|
Definition
| A type of MAC frame used to set up the initial communications between a device and the access point or between devices. |
|
|
Term
|
Definition
| An attack that intercepts communication from one device and sends a substitute communication to the intended receiver. |
|
|
Term
| MAC (Media Access Control) address filtering |
|
Definition
| An access control method that restricts access based on the media access control (MAC) address. |
|
|
Term
|
Definition
| A mechanism within the TCP/IP protocol to support mobile computing. |
|
|
Term
| Open system authentication |
|
Definition
| An authentication method in which a wireless device sends a request to the access point. The most basic and often default authentication method, it provides very little security. |
|
|
Term
|
Definition
| A wireless network that does not use an access point. |
|
|
Term
|
Definition
| A channel access method in which each device is polled in sequence if it has frames to send. |
|
|
Term
|
Definition
| A message in an unencrypted format. |
|
|
Term
|
Definition
| Using the same shared secret key to both encrypt and decrypt messages. |
|
|
Term
| PRNG (Pseudo-Random Number Generator) |
|
Definition
| A part of the process for encrypting packages using WEP that generates a keystream. |
|
|
Term
|
Definition
| A cipher algorithm used in WEP. |
|
|
Term
|
Definition
| Prioritizing frames so that time-sensitive frames are transmitted prior to data frames. |
|
|
Term
|
Definition
| The process in which a device drops a connection with one access point and establishes a connection with another. |
|
|
Term
|
Definition
| Movement between WLAN cells. |
|
|
Term
|
Definition
| The process of a receiving wireless device looking for beacons. |
|
|
Term
|
Definition
| Unskilled or novice attackers who break into computers to create damage. |
|
|
Term
|
Definition
| A cipher that takes one character and replaces it with one character messages. |
|
|
Term
| SSID (Service Set Identifier) |
|
Definition
| A unique identifier of up to 32 characters that serves as a WLAN network name. |
|
|
Term
| Shared key authentication |
|
Definition
| An authentication method in which a wireless device must encrypt challenge text before it can be authenticated. This method is more secure than open system authentication, but still not entirely secure. |
|
|
Term
|
Definition
| A telephony service that uses IP-based data packet switching networks to transmit voice communications. |
|
|
Term
|
Definition
| A cryptographic key that creates a repeating pattern. |
|
|
Term
| WEP (Wired Equivalent Privacy) |
|
Definition
| An IEEE 802.11 cryptography mechanism. |
|
|