The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Wireless LAN Setup and Security Loopholes
Abstract
This chapter gives a practical overview of the brief implementation details of the IEEE802.11 wireless LAN and the security vulnerabilities involved in such networks. Specifically, it discusses about the implementation of EAP authentication using RADIUS server with WEP encryption options. The chapter also touches on the ageing WEP and the cracking process, along with the current TKIP and CCMP mechanisms. War driving and other security attacks on wireless networks are also briefly covered. The chapter concludes with practical security recommendations that can keep intruders at bay. The authors hope that any reader would thus be well informed on the security vulnerabilities and the precautions that are associated with 802.11 wireless networks.
Related Content
Emrah Arğın.
© 2022.
16 pages.
|
Ebru Gülbuğ Erol, Mustafa Gülsün.
© 2022.
17 pages.
|
Yeşim Şener.
© 2022.
18 pages.
|
Salim Kurnaz, Deimantė Žilinskienė.
© 2022.
20 pages.
|
Dorothea Maria Bowyer, Walid El Hamad, Ciorstan Smark, Greg Evan Jones, Claire Beattie, Ying Deng.
© 2022.
29 pages.
|
Savas S. Ates, Vildan Durmaz.
© 2022.
24 pages.
|
Nusret Erceylan, Gaye Atilla.
© 2022.
20 pages.
|
|
|