Growth in the Deployment and Security of 802.11b Wireless Local Area Networks in Perth, Western Australia

نویسنده

  • Sue Webb
چکیده

Insecurely configured wireless local area networks (WLANs) present a threat to the confidentiality, availability and integrity of network data.. Several types of wireless-specific attacks may allow attackers to connect, perhaps unnoticed, to a WLAN in order to read, modify or inject data onto the victim network. This study attempted to determine the growth rate in the useage and security state of 802.11b WLANs operating in the Central Business District (CBD) of Perth, Western Australia. The study showed that the number of WLANs in Perth had more than doubled in twelve months. It also indicated that the mostly recently implemented networks had less visible security applied than those networks that have been in place for some time.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, W.A

Many organisations and individuals are installing wireless local area networks (WLANs), which are based on the IEEE 802.11b standard. Insecurely configured WLANs present a threat to the confidentiality, availability and integrity of network data. This study was designed to attempt to determine the growth rate in the use of WLAN technology and the security state of WLANs operating in the Central...

متن کامل

An analysis of security in 802.11b and 802.11g wireless networks in Perth, WA

Wireless networks extend network connectivity to client devices that are equipped with a wireless interface and antenna. The transparency of wireless transmissions allows a passive network sniffer, such as Kismet to enumerate network architecture, parameters, and confidential activity without being detected. Kismet scans were conducted in the Perth, central business district area to determine w...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Wireless Network Security in Australia: A Study of 7 Australian Capital Cities

Wireless network technology is rapidly being adopted by individuals and organizations as an alternative to existing ‘wired’ networking solutions. This research was undertaken to provide a foundation study of 802.11b wireless network security in Australian capital cities. The study employs Wardriving using the Network Stumbler program to collect sample data upon which results are based. The same...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004