IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Wireless LAN Setup and Security Loopholes

Wireless LAN Setup and Security Loopholes
View Sample PDF
Author(s): Biju Issac (Swinburne University of Technology, Malaysia)and Lawan A. Mohammed (Swinburne University of Technology, Malaysia)
Copyright: 2009
Pages: 28
Source title: Electronic Business: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): In Lee (Western Illinois University, USA)
DOI: 10.4018/978-1-60566-056-1.ch134

Purchase

View Wireless LAN Setup and Security Loopholes on the publisher's website for pricing and purchasing information.

Abstract

This chapter gives a practical overview of the brief implementation details of the IEEE802.11 wireless LAN and the security vulnerabilities involved in such networks. Specifically, it discusses about the implementation of EAP authentication using RADIUS server with WEP encryption options. The chapter also touches on the ageing WEP and the cracking process, along with the current TKIP and CCMP mechanisms. War driving and other security attacks on wireless networks are also briefly covered. The chapter concludes with practical security recommendations that can keep intruders at bay. The authors hope that any reader would thus be well informed on the security vulnerabilities and the precautions that are associated with 802.11 wireless networks.

Related Content

Emrah Arğın. © 2022. 16 pages.
Ebru Gülbuğ Erol, Mustafa Gülsün. © 2022. 17 pages.
Yeşim Şener. © 2022. 18 pages.
Salim Kurnaz, Deimantė Žilinskienė. © 2022. 20 pages.
Dorothea Maria Bowyer, Walid El Hamad, Ciorstan Smark, Greg Evan Jones, Claire Beattie, Ying Deng. © 2022. 29 pages.
Savas S. Ates, Vildan Durmaz. © 2022. 24 pages.
Nusret Erceylan, Gaye Atilla. © 2022. 20 pages.
Body Bottom