Securing wireless networks

0Citations
Citations of this article
50Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The purpose of this project is to analyze the security flaws in wireless network security and simulate attacker and defensive roles. Different kinds of security protocols will be examined such as the IEEE 802.11x standards along with Bluetooth short range wireless communications to GSM long range wireless technology. Uses of these protocols vary. They can go from the simple replacement of the confusing web of cables to being able to access remote locations without the need of a ridiculously long wire. The IEEE wireless standard(s) that will be pursued are 802.11b and 802.11g. IEEE 802.11 b emits raw data rates of 11mbps. The older standard of IEEE 802.11 a is faster than 802.11b but it is not compatible with most 802.11b/g equipment which have longer range than 802.11a. 802.11g combines both technologies for high speeds and distance. The problem with wireless protocols is that they are vulnerable to attack from hackers.

Author supplied keywords

Cite

CITATION STYLE

APA

Lamison-White, E. (2005). Securing wireless networks. In WMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings (Vol. 10, pp. 341–345). https://doi.org/10.1201/noe0849385858-35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free