58 Percent Secure: Why Do So Many Wireless Networks Not Use Encryption?
نویسندگان
چکیده
This research project will analyze a large (n=98,000) dataset of wireless access points in two medium-sized US cities to examine changes in the use of encryption in 802.11 wireless networks over time. Further, changes in the use of encryption in these networks based on the socio-economic status of the network owner, and based on whether the owner is a business or an individual will be investigated. There is currently almost no research investigating the spread of wireless encryption as wireless networks become more prevalent. This ground-breaking research will establish a baseline for business and personal use of encryption in wireless networks, correlated with socioeconomic status and other census data. This baseline will help future researchers determine whether changes to wireless protocols and changes in methods of setting up wireless equipment increases the use of security protocols, thereby increasing the security of the network.
منابع مشابه
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملAn efficient solution for management of pre-distribution in wireless sensor networks
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملPoster Abstract: AMSecure—Secure Link-Layer Communication in TinyOS for IEEE 802.15.4-based Wireless Sensor Networks
Many wireless sensor networks (WSNs) for medical, military, and control applications require strong security protection of messages. Yet, the algorithms and protocols used must be efficient in space and time due to the constrained resources of sensor devices. Existing link-layer security solutions for WSNs, such as SPINS [3] and TinySec [2]), rely on software-level encryption and authentication...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009