Information Technology Reference
In-Depth Information
Wireless Insecurities
M I C H A E L S T H U LT Z A N D J A C O B U E C K E R
Internet Forensics Laboratory
Center for Cybermedia Research
University of Nevada, Las Vegas
USA
H A L B E R G H E L
University of Canterbury
New Zealand
and
Internet Forensics Laboratory
Center for Cybermedia Research
University of Nevada, Las Vegas
USA
Abstract
The popularity of wireless networking is a function of convenience. It addresses
one of the most important goals in advanced computing technology: mobil-
ity. When viewed conceptually, wireless technology can be seen as having a
contemporaneous, parallel evolutionary path with remote login, distributed, and
nomadic computing in the area of computing and car portable, car and cellular
phones in the area of telecommunications.
This chapter provides an overview of the wireless landscape and the security
mechanisms that have been introduced in an effort to protect Wireless Local Area
Networks (WLANs). It then gives a detailed description of these mechanisms
including a discussion of their inherent weaknesses. The conclusion is there is
no effective WLAN security available in today's environment.
1.TheWirelessLandscape ................................. 226
1.1.TheWLANEnvironment.............................. 228
2.BasicWirelessSecurity ................................. 229
2.1.WiredEquivalentPrivacy(WEP) ......................... 229
Search WWH ::




Custom Search