Advertisement

A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs

  • Alastair Nisbet
  • Andrew Woodward
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9722)

Abstract

Wireless network technology has been available for public and private use for almost two decades. The casual approach to security with the early standards and channel selection began to cause issues when the initial security standard, WEP, was discovered to have serious flaws. The closer examination of security and efficiency that followed led to better security protocols, easier setup and better guidelines to ensure efficiency of radio communications. A survey of 5 areas throughout New Zealand was conducted and this is compared with a survey of 5 areas around Perth in Western Australia. The results indicate that whilst improvements continue to be made in security implementations, a small percentage of users do not implement their networks with the recommended settings. Whilst Australian users are slightly better at complying with recommendations, it is clear that some work still needs to be done in the areas of security and efficiency.

Keywords

Wireless Network Security Privacy Bandwidth 

References

  1. 1.
    Walker, J.: Unsafe at any key size, An analysis of the WEP encapsulation (2000). http://www.dis.org/wl/pdf/unsafe.pdf. Accessed 19 July 2005
  2. 2.
    Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Arbaugh, W.A., et al.: Your 80211 Wireless Network has no Clothes. IEEE Wirel. Commun. 9(6), 44–51 (2002)CrossRefGoogle Scholar
  4. 4.
    Stubblefield, A., Loannidis, J., Rubin, A.: Using the Fluhrer, Mantin, and Shamir attack to break WEP. In: Network and Distributed Systems Security Symposium (2002)Google Scholar
  5. 5.
    Cam-Winget, N., et al.: Security flaws in 802.11 data link protocols. Commun. ACM 46(5), 35–39 (2003)CrossRefGoogle Scholar
  6. 6.
    Vibhuti, S.: IEEE 802.11 WEP (Wired Equivalent Privacy) Concepts and Vulnerability (2005)Google Scholar
  7. 7.
    Walker, J.: 802.11 Security Series Part III: AES Based Encapsulations of 802.11 Data. http://jcbserver.uwaterloo.ca/cs436/handouts/miscellaneous/Intel_Wireless_1.pdf (2003). Accessed 19 July 2005
  8. 8.
    Nechvatal, J., et al.: Report on the Development of the Advanced Encryption Standard (AES), 2nd edn., October 2000. 19th January 2007Google Scholar
  9. 9.
    WiFi Alliance Introducing WiFi Protected Setup (2007)Google Scholar
  10. 10.
    Lashkari, A.H., Danesh, M.M.S., Samadi, B.: A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In: 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009 (2009)Google Scholar
  11. 11.
    Kirk, J.: In Australia Secure Your Wi-Fi or Face a Visit From the Police (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.School of Engineering, Computer and Mathematical SciencesAuckland University of TechnologyAucklandNew Zealand
  2. 2.School of Computer and Security Science SRI - Security Research InstituteEdith Cowan University PerthJoondalupAustralia

Personalised recommendations