Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Hi-index | 0.00 |
Wireless networks are an integral part of day-to-day life for many people, with businesses and home users relying on them for connectivity and communication. This paper examines the problems relating to the topic of wireless security and the background literature. Following this, primary research has been undertaken that focuses on the current trend of wireless security. Previous work is used to create a timeline of encryption usage and helps to exhibit the differences between 2009 and 2012. Moreover, a novel 802.11 denial-of-service device has been created to demonstrate the way in which it is possible to design a new threat based on current technologies and equipment that is freely available. The findings are then used to produce recommendations that present the most appropriate countermeasures to the threats found.