{"id":"https://openalex.org/W2189370711","doi":"https://doi.org/10.17487/rfc5418","title":"Control And Provisioning of Wireless Access Points (CAPWAP) Threat Analysis for IEEE 802.11 Deployments","display_name":"Control And Provisioning of Wireless Access Points (CAPWAP) Threat Analysis for IEEE 802.11 Deployments","publication_year":2009,"publication_date":"2009-03-01","ids":{"openalex":"https://openalex.org/W2189370711","doi":"https://doi.org/10.17487/rfc5418","mag":"2189370711"},"language":"en","primary_location":{"id":"doi:10.17487/rfc5418","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc5418","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108542225","display_name":"Sean D. Kelly","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"S. Kelly","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5089771591","display_name":"T. Charles Clancy","orcid":"https://orcid.org/0000-0001-8314-8470"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"T. Clancy","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108542225"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10575","display_name":"Wireless Communication Networks Research","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6858740448951721},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.6688483357429504},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6203361749649048},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5934797525405884},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5401983857154846},{"id":"https://openalex.org/keywords/wireless-distribution-system","display_name":"Wireless distribution system","score":0.4364245533943176},{"id":"https://openalex.org/keywords/ieee-802.11","display_name":"IEEE 802.11","score":0.42036232352256775},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.40291258692741394},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3820279836654663},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3782500624656677},{"id":"https://openalex.org/keywords/wi-fi-array","display_name":"Wi-Fi array","score":0.19335582852363586}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6858740448951721},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.6688483357429504},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6203361749649048},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5934797525405884},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5401983857154846},{"id":"https://openalex.org/C33947955","wikidata":"https://www.wikidata.org/wiki/Q1429342","display_name":"Wireless distribution system","level":5,"score":0.4364245533943176},{"id":"https://openalex.org/C185298936","wikidata":"https://www.wikidata.org/wiki/Q193228","display_name":"IEEE 802.11","level":4,"score":0.42036232352256775},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.40291258692741394},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3820279836654663},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3782500624656677},{"id":"https://openalex.org/C152153834","wikidata":"https://www.wikidata.org/wiki/Q1339878","display_name":"Wi-Fi array","level":4,"score":0.19335582852363586}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.17487/rfc5418","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc5418","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W84228712","https://openalex.org/W1498841687","https://openalex.org/W1516557927","https://openalex.org/W1556026683","https://openalex.org/W1744779065","https://openalex.org/W2117797620","https://openalex.org/W2132147947","https://openalex.org/W2138158583","https://openalex.org/W2300652162","https://openalex.org/W2307080671"],"related_works":["https://openalex.org/W3135356610","https://openalex.org/W3086993005","https://openalex.org/W2391163222","https://openalex.org/W2794910759","https://openalex.org/W3005787259","https://openalex.org/W2330202239","https://openalex.org/W2621916887","https://openalex.org/W3121132318","https://openalex.org/W2345040257","https://openalex.org/W1634898769"],"abstract_inverted_index":{"Early":[0],"Wireless":[1,37],"Local":[2],"Area":[3],"Network":[4],"(WLAN)":[5],"deployments":[6],"feature":[7],"a":[8,15],"fat\nAccess":[9],"Point":[10],"(AP),":[11],"which":[12],"serves":[13],"as":[14],"\\%stand-alone":[16],"interface":[17],"between\nthe":[18],"wired":[19],"and":[20,29,32,57,78],"wireless":[21],"network":[22,55],"segments.":[23],"However,":[24],"this":[25],"model":[26],"raises\nscaling,":[27],"mobility,":[28],"manageability":[30],"issues,":[31],"the":[33,50,58,70,80,94],"Control":[34],"and\nProvisioning":[35],"of":[36,76],"Access":[38],"Points":[39],"(CAPWAP)":[40],"protocol":[41],"is":[42],"meant":[43],"to\naddress":[44],"these":[45,61],"issues.":[46],"CAPWAP":[47,77,86],"effectively":[48],"splits":[49],"fat":[51],"AP\nfunctionality":[52],"into":[53],"two":[54],"elements,":[56],"communication":[59],"channel\nbetween":[60],"components":[62],"may":[63],"traverse":[64],"potentially":[65],"hostile":[66],"hops.":[67],"This\ndocument":[68],"analyzes":[69],"security":[71],"exposure":[72],"resulting":[73],"from":[74],"the\nintroduction":[75],"summarizes":[79],"associated":[81],"security\nconsiderations":[82],"for":[83,93],"IEEE":[84],"802.11-based":[85],"implementations":[87],"and\ndeployments.":[88],"This":[89],"memo":[90],"provides":[91],"information":[92],"Internet\ncommunity.":[95]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
