The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Wireless LAN Setup and Security Loopholes
Abstract
This chapter gives a practical overview of the brief implementation details of the IEEE802.11 wireless LAN and the security vulnerabilities involved in such networks. Specifically, it discusses about the implementation of EAP authentication using RADIUS server with WEP encryption options. The chapter also touches on the ageing WEP and the cracking process, along with the current TKIP and CCMP mechanisms. War driving and other security attacks on wireless networks are also briefly covered. The chapter concludes with practical security recommendations that can keep intruders at bay. The authors hope that any reader would thus be well informed on the security vulnerabilities and the precautions that are associated with 802.11 wireless networks.
Related Content
Maria A. Vetrova, Dinara V. Ivanova.
© 2025.
24 pages.
|
Sviatlana Hrytsevich, Muhammad Asad Tahir.
© 2025.
18 pages.
|
Valeriia V. Kulibanova, Tatiana R. Teor, Irina A. Ilyina.
© 2025.
22 pages.
|
Danil P. Egorov, Anatoliy I. Chistobaev, Kirill P. Egorov.
© 2025.
22 pages.
|
Alisa Torosyan, Olga Tcukanova, Natalia Alekseeva, Abdul Hameed Qureshi, Shafiya Qadeer Memon.
© 2025.
26 pages.
|
Elena I. Generalnitskaia, Natalya A. Loginova.
© 2025.
22 pages.
|
Yulia V. Granitsa.
© 2025.
22 pages.
|
|
|