Security Analysis of Public Wireless Internet Access Points (November 2004)
نویسندگان
چکیده
Over the past few years, wireless networks and wireless Internet have become ever increasingly popular, and with it, many security issues have arisen. An important topic is the security of wireless networks. This report investigates two possible solutions, Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). Both of these solutions can protect wireless communications from eavesdropping and modification. Nevertheless, they still have their own vulnerabilities. A brief description of the next-generation 802.11i and WPA2 wireless security will also be included in the report. IndexTerms—Wireless Security, WEP, WPA, 802.11i, and Cryptography.
منابع مشابه
A Protection Motivation Theory Approach to Home Wireless Security
Research in socio-technical factors in computer security has traditionally focused on employees and their work practice within the premises of the organization. However, with universal access to computing and the diverse means of connecting such devices to each another and to the global Internet, work carried out has shifted outside one central physical location to encompass a variety of possib...
متن کاملThe Peer-to-Peer Wireless Network Confederation: Enabling Global Wi-Fi Roaming
Belonging to the same family of standards as Ethernet, it was nicknamed 'Wireless Ethernet' and was considered an appropriate networking technology for offices because it did not rely on cables. Although burdened by inherent insecurity (Fluhrer, 2001) and low bit rates compared to its wired equivalent, IEEE 802.11 was a success. The cost of manufacturing 802.11 chipsets fell quickly and 802.11 ...
متن کاملYour 80211 wireless network has no clothes
The explosive growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. During the beginning of the commercialization of the Internet, organizations and individuals connected without concern for the security of their system or network. Over time, it became apparent that some form of security was required to prevent outsiders from expl...
متن کاملSecurity Measures in Mobile Commerce: Problems and Solutions
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as well. Today, new technologies that allow mobile (cellular) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Comme...
متن کاملCertificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN)
Several Extensible Authentication Protocol (EAP) [EAP] authentication methods employ X.509 public key certificates. For example, EAP-TLS [EAP-TLS] can be used with PPP [PPP] as well as IEEE 802.1X [802.1X]. PPP is used for dial-up and VPN environments. IEEE 802.1X defines port-based, network access control, and it is used to provide authenticated network access for Ethernet, Token Ring, and Wir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004