New Challenges to Information Security Caused by the Introduction of Wi-Fi Technologies
نویسندگان
چکیده
منابع مشابه
Surveying Wi-fi Security
This paper is a study of the use and possible flaws of the two basic cryptographic protocols (WEP, WPA) in Wi-Fi Networks. It is presenting some very easy to implement methods to gain malicious access to such networks by disclosing the network secret key, using Windows Operating Systems, like Win XP. It is also describing the shutter of the myth saying that the MAC Address filtering is a safe p...
متن کاملA Hands-on Introduction to GIS with a Simple Application to Wi-Fi Security
Information Systems traditionally involve the application of computing to solve the problems of organizations. Geographic Information Systems (GIS) are characterized by data, spatial objects, which have locations (e.g. addresses, landmarks, geopolitical boundaries, etc.) and data associated with them (e.g. demographic information, value, etc.). While many associate GIS systems with scientific d...
متن کاملWi-Fi security: wireless with confidence
Since the IEEE ratification of the 802.11 standard in 1999, continuous exploits have been discovered compromising the confidentiality, integrity and availability of 802.11 networks. This paper describes the justification for a project to assess the security status of wireless network usage in society. It reviews the status of both commercial and residential approaches to wireless network securi...
متن کاملNaïve Security in a Wi-Fi World
Despite nearly ubiquitous access to wireless networks, many users still engage in risky behaviors, make bad choices, or are seemingly indifferent to the concerns that security and privacy researchers work diligently to address. At present, research on user attitudes toward security and privacy on public Wi-Fi networks is rare. This paper explores Wi-Fi security and privacy by analyzing users’ c...
متن کاملA New Chaotic Encryption Algorithm to Enhance the Security of ZigBee and Wi-Fi networks
Wi-Fi and Zigbee networks are widely deployed in wireless industrial control and monitoring applications. The security protocols used in these wireless networks rely on stream cipher to encrypt data before being transmitted. These protocols are secure but they don’t respect the real-time requirement of industrial control. Chaotic systems are able to produce stream cipher with higher randomicity...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information & Security: An International Journal
سال: 2014
ISSN: 0861-5160,1314-2119
DOI: 10.11610/isij.3105