Wireless

Uloženo v:
Podrobná bibliografie
Název: Wireless
Přispěvatelé: The Pennsylvania State University CiteSeerX Archives
Zdroj: http://www.naccq.ac.nz/conference05/proceedings_04/linsecurity.pdf.
Sbírka: CiteSeerX
Témata: IEEE 802.11b, war driving, access point, Wi-Fi Protected Access, Extensible Authentication Protocol, Message Integrity Code, Temporal Key Integrity Protocol, Service Set Identifier, Media Access Control, Wireless Equivalent Privacy encryption, IPSec
Popis: network security This paper discusses the security of the wireless networking standard IEEE 802.11b and describes a “war driving ” field trial carried out to check the security of wireless networks in Auckland’s Central Business District (CBD). The results showed that the built-in security features of the IEEE 802.11b standard were often not configured appropriately and in many cases not even used, making the networks vulnerable to attacks. A geographical positioning system (GPS) was used to record the location of the access points (APs) and could have been used by a hacker to launch specific attacks.
Druh dokumentu: text
Popis souboru: application/pdf
Jazyk: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.964; http://www.naccq.ac.nz/conference05/proceedings_04/linsecurity.pdf
Dostupnost: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.964
http://www.naccq.ac.nz/conference05/proceedings_04/linsecurity.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Přístupové číslo: edsbas.82D7CF03
Databáze: BASE
Popis
Abstrakt:network security This paper discusses the security of the wireless networking standard IEEE 802.11b and describes a “war driving ” field trial carried out to check the security of wireless networks in Auckland’s Central Business District (CBD). The results showed that the built-in security features of the IEEE 802.11b standard were often not configured appropriately and in many cases not even used, making the networks vulnerable to attacks. A geographical positioning system (GPS) was used to record the location of the access points (APs) and could have been used by a hacker to launch specific attacks.