Skip to main content

Wireless Network Security Vulnerabilities and Concerns

  • Conference paper
Security Technology, Disaster Recovery and Business Continuity

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 122))

Abstract

The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet’s expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other’s defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karygiannis, T., Owens, L.: Wireless Network Security: 802.11, Bluetooth and Handheld Devices, National Institute of Standards and Technology Gaithersburg, MD 20899-8930 (November 2002)

    Google Scholar 

  2. http://www.wirelesstutorials.info/wireless_networking.html

  3. http://en.wikipedia.org/wiki/Photophone#World.27s_first_wireless_telephone_communication_E2.80.93_April_1880

    Google Scholar 

  4. Stallings, W.: Wireless Communications and Networks. Prentice Hall, Englewood Cliffs (August 2001)

    Google Scholar 

  5. Bidgoli, H.: The Handbook of Information Security. John Wiley & Sons, Inc., Chichester (2005)

    Google Scholar 

  6. Wireless networks have had a significant impact on the world as far back as World War II. Through the use of wireless networks, wikipedia.org/wiki/Wireless_network

  7. Wi-Fi Protected Access (WPA and WPA2) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol, wikipedia.org/wiki/Wi-Fi_Protected_Access

  8. Brenner, P.: A Technical Tutorial on the IEEE 802-11 Protocol, Director of Engineering, BreezCom

    Google Scholar 

  9. Zhang, Y., Wenke, L.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (2000); Arbaugh, W.A., Shankar, N., Justin Wan, Y.C.: Your 802.11 Wireless Network has No Clothes. Department of Computer Science, University of Maryland, March 31 (2001)

    Google Scholar 

  10. Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communiccation Conference on Mobile Computing and Networking (2001), http://www.springerlink.com/index/cjut5dxd8r9tvrpe.pdf

  11. Borisov, N., Goldberg, I., Wagner, D., Berkeley, U.C., Cox, J.: LAN Services Set to Go Wireless, Network World, August 20 (2001); IEEE Working Group for WLAN Standards, http://grouper.ieee.org/groups/802/11/index.html

  12. Borisov, N.: Deploying Wireless LANs and Voice & Data. McGraw-Hill, New York (2001), doi.ieeecomputersociety.org/10.1109/6294.977772

    Google Scholar 

  13. Bradley, T.: CISSP-ISSAP, Introduction to Packet Sniffing, former About.com Guide

    Google Scholar 

  14. Borisov, N., Goldberg, I., Wagnert, D.: Security of the WEP algorithm, wep@isaac.cs.berkeley.edu

    Google Scholar 

  15. Paul, S., Preneel, B.: A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 245–259. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Khan, S., et al.: Denial of Service Attacks and Challenges in Broadband Wireless Networks. IJCSNS International Journal of Computer Science and Network Security 8(7) (July 2008)

    Google Scholar 

  17. Ingeborn, A., Ingeborn: Lucent Orinoco Registry Encryption/Decryption, http://www.cqure.net/tools03.html

  18. Tzu, S., Zi, S.: The Art of War. Dover Publications, New Paperback, 96 pages (2002) ISBN 0486425576

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mushtaq, A. (2010). Wireless Network Security Vulnerabilities and Concerns. In: Kim, Th., Fang, Wc., Khan, M.K., Arnett, K.P., Kang, Hj., Ślęzak, D. (eds) Security Technology, Disaster Recovery and Business Continuity. Communications in Computer and Information Science, vol 122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17610-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17610-4_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17609-8

  • Online ISBN: 978-3-642-17610-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics