Skip to main navigation Skip to search Skip to main content

Choosing the right wireless LAN security protocol for the home and business user

  • Carsten Maple
  • , Helen Jacobs
  • , Matthew Reeve

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

The introduction and evolution of security standards for wireless networking has been a problematic process. Flaws in the initial security standard resulted in quick-fix solutions and interoperability issues. As wireless networks are not confined to a building, there is an added security risk that radio signals can be detected externally. Wireless networking has rapidly increased in popularity over the last few years due to the flexibility it provides. Given the simultaneous growth of e-government services there is particular risk to the citizen of identity theft. This article discusses the progression of wireless security protocols since their introduction and the effect this has had on home and business users. The risks of using wireless networks are outlined in the paper and recommendations for securing wireless networks are reviewed.
Original languageEnglish
Title of host publication First International Conference on Availability, Reliability and Security (ARES'06)
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)0769525679
DOIs
Publication statusPublished - 8 May 2006
EventFirst International Conference on Availability, Reliability and Security (ARES'06) - Vienna
Duration: 20 Apr 200622 Apr 2006

Conference

ConferenceFirst International Conference on Availability, Reliability and Security (ARES'06)
CityVienna
Period20/04/0622/04/06
OtherFirst International Conference on Availability, Reliability and Security (ARES'06) (20/04/2006-22/04/2006, Vienna)

Keywords

  • wireless LAN security

Fingerprint

Dive into the research topics of 'Choosing the right wireless LAN security protocol for the home and business user'. Together they form a unique fingerprint.

Cite this