Addressing WiFi Security Concerns

Addressing WiFi Security Concerns

Kevin Curran, Elaine Smyth
ISBN13: 9781599042749|ISBN10: 1599042746|ISBN13 Softcover: 9781599042756|EISBN13: 9781599042763
DOI: 10.4018/978-1-59904-274-9.ch012
Cite Chapter Cite Chapter

MLA

Curran, Kevin, and Elaine Smyth. "Addressing WiFi Security Concerns." Business Data Communications and Networking: A Research Perspective, edited by Jairo Gutierrez , IGI Global, 2007, pp. 302-327. https://doi.org/10.4018/978-1-59904-274-9.ch012

APA

Curran, K. & Smyth, E. (2007). Addressing WiFi Security Concerns. In J. Gutierrez (Ed.), Business Data Communications and Networking: A Research Perspective (pp. 302-327). IGI Global. https://doi.org/10.4018/978-1-59904-274-9.ch012

Chicago

Curran, Kevin, and Elaine Smyth. "Addressing WiFi Security Concerns." In Business Data Communications and Networking: A Research Perspective, edited by Jairo Gutierrez , 302-327. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59904-274-9.ch012

Export Reference

Mendeley
Favorite

Abstract

Signal leakage means that wireless network communications can be picked up outside the physical boundaries of the building in which they are being operated, meaning a hacker can operate from the street outside. In addition to signal leakage—the wired equivalent privacy protocol is inherently weak and there are various other attacks that can be initiated against WLAN’s. This research commences by conducting a war driving expedition to ascertain the number of unprotected WLAN devices in use in a one small town. We conclude by making recommendations for three groups of user; home user, small office/home office (SOHO) and medium to large organisations. Home users should implement all the security measures their hardware offers them, to include WEP at the longest key length permitted and implement firewalls on all connected PCs changing their WEP key on a weekly basis. The small office group should implement WPA-SPK; and the medium to large organisations should implement one or more of either WPA enterprise with a RADIUS server, VPN software, IDSs, and provide documented policies in relation to WLANs and their use.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.