Wireless LAN setup and security loopholes

Biju Issac, Lawan A. Mohammed

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

This chapter gives a practical overview of the brief implementation details of the IEEE802.11 wireless LAN and the security vulnerabilities involved in such networks. Specifically, it discusses about the implementation of EAP authentication using RADIUS server with WEP encryption options. The chapter also touches on the ageing WEP and the cracking process, along with the current TKIP and CCMP mechanisms. War driving and other security attacks on wireless networks are also briefly covered. The chapter concludes with practical security recommendations that can keep intruders at bay. The authors hope that any reader would thus be well informed on the security vulnerabilities and the precautions that are associated with 802.11 wireless networks.

Original languageEnglish
Title of host publicationWeb Services Security and E-Business
PublisherIGI Global
Pages1-31
Number of pages31
ISBN (Electronic)9781599041698
ISBN (Print)9781599041681
DOIs
Publication statusPublished - 2007
Externally publishedYes

Fingerprint Dive into the research topics of 'Wireless LAN setup and security loopholes'. Together they form a unique fingerprint.

Cite this