Wireless LAN Setup and Security Loopholes

Wireless LAN Setup and Security Loopholes

Biju Issac, Lawan A. Mohammed
ISBN13: 9781605660561|ISBN10: 1605660566|EISBN13: 9781605660578
DOI: 10.4018/978-1-60566-056-1.ch134
Cite Chapter Cite Chapter

MLA

Issac, Biju, and Lawan A. Mohammed. "Wireless LAN Setup and Security Loopholes." Electronic Business: Concepts, Methodologies, Tools, and Applications, edited by In Lee, IGI Global, 2009, pp. 2155-2182. https://doi.org/10.4018/978-1-60566-056-1.ch134

APA

Issac, B. & Mohammed, L. A. (2009). Wireless LAN Setup and Security Loopholes. In I. Lee (Ed.), Electronic Business: Concepts, Methodologies, Tools, and Applications (pp. 2155-2182). IGI Global. https://doi.org/10.4018/978-1-60566-056-1.ch134

Chicago

Issac, Biju, and Lawan A. Mohammed. "Wireless LAN Setup and Security Loopholes." In Electronic Business: Concepts, Methodologies, Tools, and Applications, edited by In Lee, 2155-2182. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-056-1.ch134

Export Reference

Mendeley
Favorite

Abstract

This chapter gives a practical overview of the brief implementation details of the IEEE802.11 wireless LAN and the security vulnerabilities involved in such networks. Specifically, it discusses about the implementation of EAP authentication using RADIUS server with WEP encryption options. The chapter also touches on the ageing WEP and the cracking process, along with the current TKIP and CCMP mechanisms. War driving and other security attacks on wireless networks are also briefly covered. The chapter concludes with practical security recommendations that can keep intruders at bay. The authors hope that any reader would thus be well informed on the security vulnerabilities and the precautions that are associated with 802.11 wireless networks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.