Abstract
The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet’s expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other’s defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Karygiannis, T., Owens, L.: Wireless Network Security: 802.11, Bluetooth and Handheld Devices, National Institute of Standards and Technology Gaithersburg, MD 20899-8930 (November 2002)
http://en.wikipedia.org/wiki/Photophone#World.27s_first_wireless_telephone_communication_E2.80.93_April_1880
Stallings, W.: Wireless Communications and Networks. Prentice Hall, Englewood Cliffs (August 2001)
Bidgoli, H.: The Handbook of Information Security. John Wiley & Sons, Inc., Chichester (2005)
Wireless networks have had a significant impact on the world as far back as World War II. Through the use of wireless networks, wikipedia.org/wiki/Wireless_network
Wi-Fi Protected Access (WPA and WPA2) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol, wikipedia.org/wiki/Wi-Fi_Protected_Access
Brenner, P.: A Technical Tutorial on the IEEE 802-11 Protocol, Director of Engineering, BreezCom
Zhang, Y., Wenke, L.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (2000); Arbaugh, W.A., Shankar, N., Justin Wan, Y.C.: Your 802.11 Wireless Network has No Clothes. Department of Computer Science, University of Maryland, March 31 (2001)
Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communiccation Conference on Mobile Computing and Networking (2001), http://www.springerlink.com/index/cjut5dxd8r9tvrpe.pdf
Borisov, N., Goldberg, I., Wagner, D., Berkeley, U.C., Cox, J.: LAN Services Set to Go Wireless, Network World, August 20 (2001); IEEE Working Group for WLAN Standards, http://grouper.ieee.org/groups/802/11/index.html
Borisov, N.: Deploying Wireless LANs and Voice & Data. McGraw-Hill, New York (2001), doi.ieeecomputersociety.org/10.1109/6294.977772
Bradley, T.: CISSP-ISSAP, Introduction to Packet Sniffing, former About.com Guide
Borisov, N., Goldberg, I., Wagnert, D.: Security of the WEP algorithm, wep@isaac.cs.berkeley.edu
Paul, S., Preneel, B.: A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 245–259. Springer, Heidelberg (2004)
Khan, S., et al.: Denial of Service Attacks and Challenges in Broadband Wireless Networks. IJCSNS International Journal of Computer Science and Network Security 8(7) (July 2008)
Ingeborn, A., Ingeborn: Lucent Orinoco Registry Encryption/Decryption, http://www.cqure.net/tools03.html
Tzu, S., Zi, S.: The Art of War. Dover Publications, New Paperback, 96 pages (2002) ISBN 0486425576
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mushtaq, A. (2010). Wireless Network Security Vulnerabilities and Concerns. In: Kim, Th., Fang, Wc., Khan, M.K., Arnett, K.P., Kang, Hj., Ślęzak, D. (eds) Security Technology, Disaster Recovery and Business Continuity. Communications in Computer and Information Science, vol 122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17610-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-17610-4_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17609-8
Online ISBN: 978-3-642-17610-4
eBook Packages: Computer ScienceComputer Science (R0)