Wireless
Uloženo v:
| Název: | Wireless |
|---|---|
| Přispěvatelé: | The Pennsylvania State University CiteSeerX Archives |
| Zdroj: | http://www.naccq.ac.nz/conference05/proceedings_04/linsecurity.pdf. |
| Sbírka: | CiteSeerX |
| Témata: | IEEE 802.11b, war driving, access point, Wi-Fi Protected Access, Extensible Authentication Protocol, Message Integrity Code, Temporal Key Integrity Protocol, Service Set Identifier, Media Access Control, Wireless Equivalent Privacy encryption, IPSec |
| Popis: | network security This paper discusses the security of the wireless networking standard IEEE 802.11b and describes a “war driving ” field trial carried out to check the security of wireless networks in Auckland’s Central Business District (CBD). The results showed that the built-in security features of the IEEE 802.11b standard were often not configured appropriately and in many cases not even used, making the networks vulnerable to attacks. A geographical positioning system (GPS) was used to record the location of the access points (APs) and could have been used by a hacker to launch specific attacks. |
| Druh dokumentu: | text |
| Popis souboru: | application/pdf |
| Jazyk: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.964; http://www.naccq.ac.nz/conference05/proceedings_04/linsecurity.pdf |
| Dostupnost: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.964 http://www.naccq.ac.nz/conference05/proceedings_04/linsecurity.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Přístupové číslo: | edsbas.82D7CF03 |
| Databáze: | BASE |
| Abstrakt: | network security This paper discusses the security of the wireless networking standard IEEE 802.11b and describes a “war driving ” field trial carried out to check the security of wireless networks in Auckland’s Central Business District (CBD). The results showed that the built-in security features of the IEEE 802.11b standard were often not configured appropriately and in many cases not even used, making the networks vulnerable to attacks. A geographical positioning system (GPS) was used to record the location of the access points (APs) and could have been used by a hacker to launch specific attacks. |
|---|
Nájsť tento článok vo Web of Science