Economy and public welfare by providing technical leadership for the nation s.
Nist wireless security standards.
It also includes guidance on best practices for establishing secure wireless networks using the emerging wi fi technology.
A guide to ieee 802 11i reports on computer systems technology the information technology laboratory itl at the national institute of standards and technology nist promotes the u s.
A wireless local area network wlan is a group of wireless networking devices within a limited geographic area such as an office building that exchange data through radio communications.
The purpose of this publication is to provide organizations with recommendations for improving the security configuration and monitoring of their ieee 802 11 wireless local area networks wlans and their devices connecting to those networks.
Security issues related to wireless personal area networks based on the bluetooth specifications which were developed by an industry consortium.
For 20 years the computer security resource center csrc has provided access to nist s cybersecurity and information security related projects publications news and events.
Nist ctl s wireless networks division works with industry to develop deploy and promote emerging technologies and standards that will dramatically improve the operation and use of wireless networks.
It discusses three aspects of wireless security.
Our team based at nist s main campus in gaithersburg md specializes in communications networks and protocols as well as in the digital.
Nist announces the final release of special publication 800 153 guidelines for securing wireless local area networks wlans.
Security issues associated with wireless local area networks wlans that are based on institute of electrical and electronics engineers ieee standards 802 11.
The national institute of standards and technology nist developed this document in furtherance of its statutory responsibilities under the federal information security management act fisma of 2002 public law 107 347.
The security of each wlan is heavily dependent on how well each wlan component including client devices access points ap and wireless switches is secured throughout the wlan lifecycle from initial.
It describes secure methods used to authenticate users in a wireless environment and presents several sample case studies of wireless deployment.
And security of wireless handheld devices.