The Dangers of Mitigating Security Design Flaws: A Wireless Case Study
IEEE Security and Privacy
Improving the latency of 802.11 hand-offs using neighbor graphs
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Network selection and discovery of service information in public WLAN hotspots
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
Wireless Personal Communications: An International Journal
Flexible and fast security solution for wireless LAN
Pervasive and Mobile Computing
On the impact of quality of protection in wireless local area networks with IP mobility
Mobile Networks and Applications
Architecture of secure cross-platform and network communications
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Proximity breeds danger: emerging threats in metro-area wireless networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Virtual private networks over a wireless infrastructure: evaluation and performance analys
ICCOMP'05 Proceedings of the 9th WSEAS International Conference on Computers
MobiSEC: a novel security architecture for wireless mesh networks
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Extending Problem Frames to deal with stakeholder problems: An Agent- and Goal-Oriented Approach
Proceedings of the 2009 ACM symposium on Applied Computing
A Sample of Consumer Wi-Fi Use & Security in the UK
CNSR '09 Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
Implementation of a security framework for wireless multi-hop networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
A Quantitative Study of Two Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2)
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
A channel-based hypothesis testing approach to enhance user authentication in wireless networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
On channel-based user authentication for mobile terminals
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Security of IEEE 802.16 in mesh mode
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
802.11 wireless network policy recommendation for usage within unclassified government networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Improved key management scheme for IEEE 802.11
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Authentication mechanism using one-time password for 802.11 wireless LAN
CSR'06 Proceedings of the First international computer science conference on Theory and Applications
An investigation of unauthorised use of wireless networks in adelaide, south australia
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
On a framework for energy-efficient security protocols in wireless networks
Computer Communications
A lightweight identity authentication protocol for wireless networks
Computer Communications
Robust learning intrusion detection for attacks on wireless networks
Intelligent Data Analysis
Technology and Health Care
Hi-index | 0.00 |
The explosive growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. To protect internal resources, organizations usually purchased and installed an Internet firewall. We believe that the currently deployed wireless access points present a larger security problem than the early Internet connections. A large number of organizations, based on vendor literature, believe that the security provided by their deployed wireless access points is sufficient to prevent unauthorized access and use. Unfortunately, nothing could be further from the truth. While the current access points provide several security mechanisms, our work combined with the work of others show that all of these mechanisms are completely ineffective. As a result, organizations with deployed wireless networks are vulnerable to unauthorized use of, and access to, their internal infrastructure. We present a novel solution that requires no changes or additions to any deployed wireless equipment, and is easily deployed and transparent to end users.