Wireless

Saved in:
Bibliographic Details
Title: Wireless
Contributors: The Pennsylvania State University CiteSeerX Archives
Source: http://www.naccq.ac.nz/conference05/proceedings_04/linsecurity.pdf.
Collection: CiteSeerX
Subject Terms: IEEE 802.11b, war driving, access point, Wi-Fi Protected Access, Extensible Authentication Protocol, Message Integrity Code, Temporal Key Integrity Protocol, Service Set Identifier, Media Access Control, Wireless Equivalent Privacy encryption, IPSec
Description: network security This paper discusses the security of the wireless networking standard IEEE 802.11b and describes a “war driving ” field trial carried out to check the security of wireless networks in Auckland’s Central Business District (CBD). The results showed that the built-in security features of the IEEE 802.11b standard were often not configured appropriately and in many cases not even used, making the networks vulnerable to attacks. A geographical positioning system (GPS) was used to record the location of the access points (APs) and could have been used by a hacker to launch specific attacks.
Document Type: text
File Description: application/pdf
Language: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.964; http://www.naccq.ac.nz/conference05/proceedings_04/linsecurity.pdf
Availability: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.964
http://www.naccq.ac.nz/conference05/proceedings_04/linsecurity.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Accession Number: edsbas.82D7CF03
Database: BASE
Description
Abstract:network security This paper discusses the security of the wireless networking standard IEEE 802.11b and describes a “war driving ” field trial carried out to check the security of wireless networks in Auckland’s Central Business District (CBD). The results showed that the built-in security features of the IEEE 802.11b standard were often not configured appropriately and in many cases not even used, making the networks vulnerable to attacks. A geographical positioning system (GPS) was used to record the location of the access points (APs) and could have been used by a hacker to launch specific attacks.