Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, W.A

نویسنده

  • Sue Webb
چکیده

Many organisations and individuals are installing wireless local area networks (WLANs), which are based on the IEEE 802.11b standard. Insecurely configured WLANs present a threat to the confidentiality, availability and integrity of network data. This study was designed to attempt to determine the growth rate in the use of WLAN technology and the security state of WLANs operating in the Central Business District (CBD) of Perth, Western Australia. The scope of the study was restricted to 802.11b WLANs operating in infrastructure mode, where all traffic is transmitted by wireless access points (APs). This study has been able to show that that the number of detectable WLAN devices in operation in the Perth CBD has grown significantly over the past 6 months. Additionally, the results of this study indicate that the overall security of detectable networks may have dropped slightly, and that a larger proportion of default installations may be being performed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Growth in the Deployment and Security of 802.11b Wireless Local Area Networks in Perth, Western Australia

Insecurely configured wireless local area networks (WLANs) present a threat to the confidentiality, availability and integrity of network data.. Several types of wireless-specific attacks may allow attackers to connect, perhaps unnoticed, to a WLAN in order to read, modify or inject data onto the victim network. This study attempted to determine the growth rate in the useage and security state ...

متن کامل

Quasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks

Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

An analysis of security in 802.11b and 802.11g wireless networks in Perth, WA

Wireless networks extend network connectivity to client devices that are equipped with a wireless interface and antenna. The transparency of wireless transmissions allows a passive network sniffer, such as Kismet to enumerate network architecture, parameters, and confidential activity without being detected. Kismet scans were conducted in the Perth, central business district area to determine w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003