Wireless LAN Setup and Security Loopholes

Wireless LAN Setup and Security Loopholes

Biju Issac (Swinburne University of Technology, Malaysia) and Lawan A. Mohammed (Swinburne University of Technology, Malaysia)
DOI: 10.4018/978-1-60566-056-1.ch134
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

This chapter gives a practical overview of the brief implementation details of the IEEE802.11 wireless LAN and the security vulnerabilities involved in such networks. Specifically, it discusses about the implementation of EAP authentication using RADIUS server with WEP encryption options. The chapter also touches on the ageing WEP and the cracking process, along with the current TKIP and CCMP mechanisms. War driving and other security attacks on wireless networks are also briefly covered. The chapter concludes with practical security recommendations that can keep intruders at bay. The authors hope that any reader would thus be well informed on the security vulnerabilities and the precautions that are associated with 802.11 wireless networks.

Complete Chapter List

Search this Book:
Reset