IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Wireless Network Security

Wireless Network Security
View Sample PDF
Author(s): K. Curran (University of Ulster, Northern Ireland)
Copyright: 2007
Pages: 6
Source title: Encyclopedia of Mobile Computing and Commerce
Source Author(s)/Editor(s): David Taniar (Monash University, Australia)
DOI: 10.4018/978-1-59904-002-8.ch171

Purchase

View Wireless Network Security on the publisher's website for pricing and purchasing information.

Abstract

Wireless networks have a number of security issues. Signal leakage means that network communications can be picked up outside the physical boundaries of the building in which they are being operated, meaning a hacker can operate from the street outside or discretely from blocks away. In addition to signal leakage, the wired equivalent privacy protocol is inherently weak, and in addition to WEP’s weaknesses, there are various other attacks that can be initiated against WLANs, all with detrimental effects. On the surface WLANs act the same as their wired counterparts, transporting data between network devices. However, there is one fundamental, and quite significant, difference: WLANs are based on radio communications technology as an alternative to structured wiring and cables. Data is transmitted between devices through the air by utilizing the radio waves. Devices that participate in a WLAN must have a network interface card (NIC) with wireless capabilities. This essentially means that the card contains a small radio device that allows it to communicate with other wireless devices within the defined range for that card, for example, the 2.4-2.4853 GHz range. For a device to participate in a wireless network, it must firstly be permitted to communicate with the devices in that network, and secondly it must be within the transmission range of the devices in that network. To communicate, radio-based devices take advantage of electromagnetic waves and their ability to be altered in such a manner that they can carry information, known as modulation (Sundaralingham, 2004). Here we discuss wireless security mechanisms.

Related Content

Tapan Kumar Behera. © 2023. 20 pages.
B. Narendra Kumar Rao. © 2023. 17 pages.
Blendi Rrustemi, Deti Baholli, Herolind Balaj. © 2023. 18 pages.
Alma Beluli. © 2023. 11 pages.
Jona Ndrecaj, Shkurte Berisha, Erita Çunaku. © 2023. 15 pages.
Yllka Totaj. © 2023. 12 pages.
Hla Myo Tun, Devasis Pradhan. © 2023. 31 pages.
Body Bottom