Reference Hub3
Wireless Wardriving

Wireless Wardriving

Luca Caviglione
Copyright: © 2008 |Pages: 17
ISBN13: 9781599048994|ISBN10: 159904899X|EISBN13: 9781599049007
DOI: 10.4018/978-1-59904-899-4.ch005
Cite Chapter Cite Chapter

MLA

Caviglione, Luca. "Wireless Wardriving." Handbook of Research on Wireless Security, edited by Yan Zhang, et al., IGI Global, 2008, pp. 61-77. https://doi.org/10.4018/978-1-59904-899-4.ch005

APA

Caviglione, L. (2008). Wireless Wardriving. In Y. Zhang, J. Zheng, & M. Ma (Eds.), Handbook of Research on Wireless Security (pp. 61-77). IGI Global. https://doi.org/10.4018/978-1-59904-899-4.ch005

Chicago

Caviglione, Luca. "Wireless Wardriving." In Handbook of Research on Wireless Security, edited by Yan Zhang, Jun Zheng, and Miao Ma, 61-77. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-899-4.ch005

Export Reference

Mendeley
Favorite

Abstract

Wardriving is the practice of searching wireless networks while moving. Originally, it was explicitly referred to as people searching for wireless signals by driving in vans, but nowadays it generally identifies people searching for wireless accesses while moving. Despite the legal aspects, this “quest for connectivity” spawned a quite productive underground community, which developed powerful tools, relying on cheap and standard hardware. The knowledge of these tools and techniques has many useful aspects. Firstly, when designing the security framework of a wireless LAN (WLAN), the knowledge of the vulnerabilities exploited at the basis of wardriving is a mandatory step, both to avoid penetration issues and to detect whether attacks are ongoing. Secondly, hardware and software developers can design better devices by avoiding common mistakes and using an effective suite for conducting security tests. Lastly, people who are interested in gaining a deeper understanding of wireless standards can conduct experiments by simply downloading software running on cost effective hardware. With such preamble, in this chapter we will analyze the theory, the techniques, and the tools commonly used for wardriving IEEE 802.11-based wireless networks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.