Authentication, Authorization and Accounting in the Wireless Space

Background

Being able to connect any computing device to any other, irrespective of location, is a blessing coupled with security pitfalls. For an individual, free access to any resources on the Internet is enormously powerful. For anyone concerned with corporate security, it is a major headache exposing the trove of corporate confidential information assets, both to unauthorized access and potential misuse, as well as exposure to viruses, works, and other digital pollution.

If a remote LAN is connected to the Internet it is almost certainly protected by a firewall. The identification for access control and authority is normally the IP address of the calling device. Thus the firewall for a corporate LAN is normally configured to only permit extern