On Wireless Network Security

ABSTRACT

We discuss practical security of 802.11b wireless networks through three anecdotal case studies. The dangers facing a university faculty, a small business and a home user are explored. Information Burglary—industrial espionage against telecommuters—is introduced. We investigate the underlying causes of security holes, spanning theoretic algorithmic flaws, deployment errors and end-user naivety. Failures to appreciate the range of radio coverage are highlighted and features interactions with other technologies are explored. Technical and ethical suggestions for improvements by the industry and network administrators are made.


AUTHORS

Laboratory for Communications Engineering, University of Cambridge
England

John K. Fawcett is a PhD student at the Laboratory for Communications Engineering at the University of Cambridge in England and a member of Churchill College. He graduated in 1999 with a first class BA Honours degree in Computer Science from the University of Cambridge. His research interests include advanced infrastructures for location based services, wireless networking and vehicular computing. John is a member of the British Computer Society, the IEEE and the Royal Institute of Navigators.

Research Engineer

William Sowerbutts graduated from the University of Cambridge in 2001 with a first class BA Hons in Computer Science. He was a member of Churchill College and remains on the committee of the Computer Preservation Society. William currently works as a Research Engineer. His interests include ubiquitous computing, communication networks and human interfaces, as well as dismantling other people’s electronic or mechanical devices.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com