If there were no errors, the receiving radio sends an acknowledgement packet (ACK) to the ... Each radio frequency packet you send over a Locus radio is encrypted, ...
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
ISA Wireless Communications Conference
April 15-17, 2003
“Ensuring Security in Wireless Applications”
John Callison, Regional Sales Manager
…however, it is easily possible for an unwanted user to pretend to be an Access Point and grant access to it, without having any key at all. The “rogue” Access Point can then begin listening to the encrypted data of the client and work on cracking the encryption key.
Locus prevents unwanted authentication in that both of the radios that form a link must share the same encryption key BEFORE the link is established.
If both radios do not have PRIOR knowledge of the key, the radios will not link and the encrypted data does not pass.
Wireless is made secure through: