Term
|
Definition
A wireless network that does not use an access point. Also known as peer-topeer mode or Independent Basic Service Set (IBSS). |
|
|
Term
ATIM (Ad hoc Traffic Indication Message) window |
|
Definition
A specific period of time at which each ad hoc device must be awake. |
|
|
Term
|
Definition
The process of being accepted into the wireless network. |
|
|
Term
|
Definition
A process in which the AP accepts or rejects a wireless device. |
|
|
Term
|
Definition
A server on an IEEE 802.1x network that verifies the authentication of devices. |
|
|
Term
|
Definition
The geographical area of coverage for a WLAN. |
|
|
Term
|
Definition
A group of wireless devices that is served by a single access point (AP). |
|
|
Term
|
Definition
The process of an AP in an infrastructure network or wireless device in an ad hoc network sending a beacon frame to both announce its presence and to provide the necessary information for other devices to join the network. |
|
|
Term
|
Definition
The process of an access point temporarily storing frames for wireless devices that are asleep. |
|
|
Term
|
Definition
An attack in which an attacker attempts to create every possible key combination by systematically changing one character at a time in a possible key. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
In wireless security, two packets that were created from the same initialization vector (IV). |
|
|
Term
|
Definition
A person who has been hired to break into a computer and steal information. |
|
|
Term
|
Definition
A person who violates system security with malicious intent. |
|
|
Term
|
Definition
The science of transforming information so that it is secure while it is being transmitted or stored. |
|
|
Term
|
Definition
Terrorists who attack networks and computer infrastructures in order to cause panic. |
|
|
Term
CRC (Cyclic Redundancy Check) |
|
Definition
A checksum value that is based on the contents of the text. |
|
|
Term
|
Definition
A new IP address on a foreign network. |
|
|
Term
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) |
|
Definition
A protocol designed to avoid collisions on a wireless medium. |
|
|
Term
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) |
|
Definition
A contention-based channel access method used by 802.3 Ethernet networks. |
|
|
Term
|
Definition
The process of listening on a network medium prior to transmitting. |
|
|
Term
|
Definition
A block of text that must be encrypted by a wireless device in shared key authentication. |
|
|
Term
|
Definition
Different ways of sharing a network medium. |
|
|
Term
|
Definition
A channel access method in which devices compete with each other to use the network medium. |
|
|
Term
DCF (Distributed Coordination Function) |
|
Definition
An IEEE 802.11 standard for sharing the wireless medium. |
|
|
Term
DIFS (Distributed Coordination Function IFS) |
|
Definition
An interframe space that is the standard interval between the transmission of data frames. |
|
|
Term
|
Definition
A key value that is used to encrypt wireless data transmissions when they are sent. |
|
|
Term
DoS (Denial of Service) attack |
|
Definition
An attack that attempts to make a server or other network device unavailable by flooding it with requests. |
|
|
Term
|
Definition
An attack that takes each word from a dictionary and encodes it in the same way a passphrase was encoded. |
|
|
Term
ESS (Extended Service Set) |
|
Definition
Two or more BSS networks that are connected through a common distribution system. |
|
|
Term
|
Definition
A forwarding mechanism in Mobile IP. |
|
|
Term
|
Definition
Another network on a Mobile IP service. |
|
|
Term
|
Definition
A wireless device that can be seen by an access point but not by all other wireless devices. |
|
|
Term
|
Definition
A forwarding mechanism in Mobile IP that keeps track of where a mobile computer is located. |
|
|
Term
IBSS (Independent Basic Service Set) |
|
Definition
A wireless network that does not use an access point. Also known as ad hoc or peer-to-peer mode. |
|
|
Term
|
Definition
A group of wireless devices that is served by a single access point (AP). |
|
|
Term
|
Definition
The value that an algorithm uses to encrypt or decrypt a message. |
|
|
Term
|
Definition
The output from a pseudo-random number generator (PRNG). |
|
|
Term
|
Definition
An attack method to determining the keystream by analyzing two packets that were created from the same initialization vector (IV). |
|
|
Term
|
Definition
A type of MAC frame used to set up the initial communications between a device and the access point or between devices. |
|
|
Term
|
Definition
An attack that intercepts communication from one device and sends a substitute communication to the intended receiver. |
|
|
Term
MAC (Media Access Control) address filtering |
|
Definition
An access control method that restricts access based on the media access control (MAC) address. |
|
|
Term
|
Definition
A mechanism within the TCP/IP protocol to support mobile computing. |
|
|
Term
Open system authentication |
|
Definition
An authentication method in which a wireless device sends a request to the access point. The most basic and often default authentication method, it provides very little security. |
|
|
Term
|
Definition
A wireless network that does not use an access point. |
|
|
Term
|
Definition
A channel access method in which each device is polled in sequence if it has frames to send. |
|
|
Term
|
Definition
A message in an unencrypted format. |
|
|
Term
|
Definition
Using the same shared secret key to both encrypt and decrypt messages. |
|
|
Term
PRNG (Pseudo-Random Number Generator) |
|
Definition
A part of the process for encrypting packages using WEP that generates a keystream. |
|
|
Term
|
Definition
A cipher algorithm used in WEP. |
|
|
Term
|
Definition
Prioritizing frames so that time-sensitive frames are transmitted prior to data frames. |
|
|
Term
|
Definition
The process in which a device drops a connection with one access point and establishes a connection with another. |
|
|
Term
|
Definition
Movement between WLAN cells. |
|
|
Term
|
Definition
The process of a receiving wireless device looking for beacons. |
|
|
Term
|
Definition
Unskilled or novice attackers who break into computers to create damage. |
|
|
Term
|
Definition
A cipher that takes one character and replaces it with one character messages. |
|
|
Term
SSID (Service Set Identifier) |
|
Definition
A unique identifier of up to 32 characters that serves as a WLAN network name. |
|
|
Term
Shared key authentication |
|
Definition
An authentication method in which a wireless device must encrypt challenge text before it can be authenticated. This method is more secure than open system authentication, but still not entirely secure. |
|
|
Term
|
Definition
A telephony service that uses IP-based data packet switching networks to transmit voice communications. |
|
|
Term
|
Definition
A cryptographic key that creates a repeating pattern. |
|
|
Term
WEP (Wired Equivalent Privacy) |
|
Definition
An IEEE 802.11 cryptography mechanism. |
|
|