Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Your 80211 wireless network has no clothes
IEEE Wireless Communications
Hi-index | 0.00 |
In September 2002, the Secretary of Defense issued a memorandum prohibiting most uses of wireless technology in government facilities because of the exploitation vulnerabilities. This paper will examine the current risks of allowing wireless 802.11 networks within government space for unclassified usage and will compare those risks to other existing remote access risks such as dial-up and through internet firewalls. The paper will explore risk mitigation techniques to enforce an acceptable level of security, and it will discuss the impacts on the unclassified networks if the risk mitigation techniques fail. The paper will also recommend a wireless security model to deploy 802.11 wireless networks for unclassified government use. Various implementations (including encrypted Virtual Private Network (VPN) tunnels, Wi-Fi Protected Access (WPA), and next generation 802.11i wireless solutions) will be compared to the proposed security model resulting in a recommended wireless security policy for government (or commercial) use. The paper will conclude that mutually authenticated encrypted VPN tunnels are acceptably secure and recommend networks migrate to next generation 802.11i solutions when available.