WPA2

Australian Defence Force Policy and the use of WPA2 as a Security Option for Deployment of 802.11 Wireless Networks in the Field

ABSTRACT

The wireless function is an under utilised resource for many military organisations. Until recently, Defence wireless local area network assessments have highlighted wireless inadequacies in relation to data security and the protection of sensitive information. But since the introduction of WPA2 and the acquisition of wireless applications into U.S Dept. of Defence networking infrastructure, global defence departments are testing wireless applications for advantages in the military domain. This paper examined WPA2’s security mechanisms and their relationship with the Australian Defence Force policy and military operational environments. Though still officially unacknowledged in the Australian military landscape, WPA2 offers a robust security solution that can potentially provide the Australian Defence Force with the networking flexibility that only wireless delivers. The analysis conducted here suggests that the use of wireless networks to support military operations when secured using WPA2 methods is feasible.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com