Addressing WiFi Security Concerns

Addressing WiFi Security Concerns

Kevin Curran (University of Ulster at Magee, UK) and Elaine Smyth (University of Ulster at Magee, UK)
DOI: 10.4018/978-1-59904-274-9.ch012
OnDemand PDF Download:
$37.50

Abstract

Signal leakage means that wireless network communications can be picked up outside the physical boundaries of the building in which they are being operated, meaning a hacker can operate from the street outside. In addition to signal leakage—the wired equivalent privacy protocol is inherently weak and there are various other attacks that can be initiated against WLAN’s. This research commences by conducting a war driving expedition to ascertain the number of unprotected WLAN devices in use in a one small town. We conclude by making recommendations for three groups of user; home user, small office/home office (SOHO) and medium to large organisations. Home users should implement all the security measures their hardware offers them, to include WEP at the longest key length permitted and implement firewalls on all connected PCs changing their WEP key on a weekly basis. The small office group should implement WPA-SPK; and the medium to large organisations should implement one or more of either WPA enterprise with a RADIUS server, VPN software, IDSs, and provide documented policies in relation to WLANs and their use.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Preface
Jairo Gutierrez
Chapter 1
Varadharajan Sridhar, June Park
Survivability, also known as terminal reliability, refers to keeping at least one path between specified network nodes so that some or all of... Sample PDF
Design of High Capacity Survivable Networks
$37.50
Chapter 2
Mohamed Hammami, Youssef Chahir, Liming Chen
Along with the ever growing Web is the proliferation of objectionable content, such as sex, violence, racism, and so forth. We need efficient tools... Sample PDF
A Data Mining Driven Approach for Web Classification and Filtering Based on Multimodal Content Analysis
$37.50
Chapter 3
Bryan Houliston, Nurul Sarkar
Wi-Fi (also known as IEEE 802.11b) networks are gaining widespread popularity as wireless local area networks (WLANs) due to their simplicity in... Sample PDF
Wi-Fi Deployment in Large New Zealand Organizations: A Survey
$37.50
Chapter 4
Kevin Curran, Noel Broderick
Over the years the number of Web users has increased dramatically unfortunately leading to the inherent problem of congestion. This can affect each... Sample PDF
Prevalent Factors Involved in Delays Associated with Page Downloads
$37.50
Chapter 5
Ted Chia-Han Lo, Jairo Gutiérrez
The research reported in this chapter studied the relevance of the application of network quality of service (QoS) technologies for modern... Sample PDF
Network Quality of Service for Enterprise Resource Planning Systems: A Case Study Approach
$37.50
Chapter 6
César García-Díaz, Fernando Beltrán
Congestion effects are the negative externalities or social costs that users generate on each other when using a shared network resource. Under a... Sample PDF
Cost-Based Congestion Pricing in Network Priority Models Using Axiomatic Cost Allocation Methods
$37.50
Chapter 7
Ismail Khalil Ibrahim, Ashraf Ahmad, David Taniar
Mobile multimedia, referring to multimedia information exchange over wireless networks or wireless Internet, is made possible due to the popularity... Sample PDF
Mobile Multimedia: Communication Technologies, Business Drivers, Service and Applications
$37.50
Chapter 8
Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan
The emerging of wireless computing motivates radical changes of how information is obtained. Our paper discusses a practical realisation of an... Sample PDF
Mobile Information Systems in a Hospital Organization Setting
$37.50
Chapter 9
Say Ying Lim, David Taniar, Bala Srinivasan
In this chapter, we present an extensive study of the available types of data caching in a mobile database environment. We explore the different... Sample PDF
Data Caching in a Mobile Database Environment
$37.50
Chapter 10
John Goh, David Taniar
Mining walking pattern from mobile users represents an interesting research area in the field of data mining which is about extracting patterns and... Sample PDF
Mining Walking Pattern from Mobile Users
$37.50
Chapter 11
Subhankar Dhar
This chapter presents the current state of the art of mobile ad hoc network and some important problems and challenges related to routing, power... Sample PDF
Applications and Future Trends in Mobile Ad Hoc Networks
$37.50
Chapter 12
Kevin Curran, Elaine Smyth
Signal leakage means that wireless network communications can be picked up outside the physical boundaries of the building in which they are being... Sample PDF
Addressing WiFi Security Concerns
$37.50
Chapter 13
Byung Kwan Lee, Seung Hae Yang, Tai-Chi Lee
Unlike SET (secure electronic transaction) protocol. This chapter proposes a SEEP (highly secure electronic payment) protocol, which uses ECC... Sample PDF
A SEEP Protocol Design Using 3BC, ECC(F2m) and HECC Algorithm
$37.50
Chapter 14
Kevin Curran, John Honan
This chapter investigates the problem of e-mail spam, and identifies methods to minimize the volumes. The analysis focuses on the hashcash... Sample PDF
Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach
$37.50
About the Authors