Abstract
Mobile computing is evolving at a rapid pace with 802.11 networks; the fuzzy boundaries make it easy for intruders to intercept the radio signals. War driving was performed along highways; the resulting packet analysis is explained to show how easy some security attacks can be. An elaboration is done on a host of wireless security attacks that leads to the discussion of secure wireless network design, along with some network security simulation. The paper concludes with a list of security recommendations.
| Original language | English |
|---|---|
| Journal | Information Systems Management |
| State | Published - 2007 |
Fingerprint
Dive into the research topics of 'War driving and WLAN security issues-attacks, security design and remedies'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver