Security in wireless networks

Partha Dasgupta, Tom Boyd

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Abstract

Security has often taken a backseat in the design and deployment of networking technologies. The growth of the Internet was spurred by the availability of low-cost networking access points; provision of security did not appear to be greatly needed and thus was not a major design consideration. This mistake has been felt repeatedly since the late 1990s when, after the explosion of Internet usage, exploitation of weak security emerged as one of the biggest threats to the long-term viability of the global networking medium. The same problem may plague wireless networks. In most of the protocols that use wireless networking (local area or wide area), the security mechanism is more of an afterthought. Attacks on wireless networks are quite uncommon even though they are deployed quite widely. However, the extent of deployment of wireless networks is a small fraction of the reach of wired networks. As the penetration of the wireless medium increases, the problems with wireless security are bound to become more significant. Even today, we are aware of many weak points that exist in current wireless network designs, and we can be certain that many more will be discovered.

Original languageEnglish (US)
Title of host publicationHandbook of Wireless Local Area Networks
Subtitle of host publicationApplications, Technology, Security, and Standards
PublisherCRC Press
Pages501-521
Number of pages21
ISBN (Electronic)9780203492512
ISBN (Print)9780849323232
StatePublished - Jan 1 2005

Fingerprint

Wireless networks
Internet
Explosions
Availability
Network protocols
Costs

ASJC Scopus subject areas

  • Computer Science(all)
  • Engineering(all)

Cite this

Dasgupta, P., & Boyd, T. (2005). Security in wireless networks. In Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards (pp. 501-521). CRC Press.

Security in wireless networks. / Dasgupta, Partha; Boyd, Tom.

Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards. CRC Press, 2005. p. 501-521.

Research output: Chapter in Book/Report/Conference proceedingChapter

Dasgupta, P & Boyd, T 2005, Security in wireless networks. in Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards. CRC Press, pp. 501-521.
Dasgupta P, Boyd T. Security in wireless networks. In Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards. CRC Press. 2005. p. 501-521
Dasgupta, Partha ; Boyd, Tom. / Security in wireless networks. Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards. CRC Press, 2005. pp. 501-521
@inbook{dff45adc16314eeda0ae4bccc9ca6e1f,
title = "Security in wireless networks",
abstract = "Security has often taken a backseat in the design and deployment of networking technologies. The growth of the Internet was spurred by the availability of low-cost networking access points; provision of security did not appear to be greatly needed and thus was not a major design consideration. This mistake has been felt repeatedly since the late 1990s when, after the explosion of Internet usage, exploitation of weak security emerged as one of the biggest threats to the long-term viability of the global networking medium. The same problem may plague wireless networks. In most of the protocols that use wireless networking (local area or wide area), the security mechanism is more of an afterthought. Attacks on wireless networks are quite uncommon even though they are deployed quite widely. However, the extent of deployment of wireless networks is a small fraction of the reach of wired networks. As the penetration of the wireless medium increases, the problems with wireless security are bound to become more significant. Even today, we are aware of many weak points that exist in current wireless network designs, and we can be certain that many more will be discovered.",
author = "Partha Dasgupta and Tom Boyd",
year = "2005",
month = "1",
day = "1",
language = "English (US)",
isbn = "9780849323232",
pages = "501--521",
booktitle = "Handbook of Wireless Local Area Networks",
publisher = "CRC Press",

}

TY - CHAP

T1 - Security in wireless networks

AU - Dasgupta, Partha

AU - Boyd, Tom

PY - 2005/1/1

Y1 - 2005/1/1

N2 - Security has often taken a backseat in the design and deployment of networking technologies. The growth of the Internet was spurred by the availability of low-cost networking access points; provision of security did not appear to be greatly needed and thus was not a major design consideration. This mistake has been felt repeatedly since the late 1990s when, after the explosion of Internet usage, exploitation of weak security emerged as one of the biggest threats to the long-term viability of the global networking medium. The same problem may plague wireless networks. In most of the protocols that use wireless networking (local area or wide area), the security mechanism is more of an afterthought. Attacks on wireless networks are quite uncommon even though they are deployed quite widely. However, the extent of deployment of wireless networks is a small fraction of the reach of wired networks. As the penetration of the wireless medium increases, the problems with wireless security are bound to become more significant. Even today, we are aware of many weak points that exist in current wireless network designs, and we can be certain that many more will be discovered.

AB - Security has often taken a backseat in the design and deployment of networking technologies. The growth of the Internet was spurred by the availability of low-cost networking access points; provision of security did not appear to be greatly needed and thus was not a major design consideration. This mistake has been felt repeatedly since the late 1990s when, after the explosion of Internet usage, exploitation of weak security emerged as one of the biggest threats to the long-term viability of the global networking medium. The same problem may plague wireless networks. In most of the protocols that use wireless networking (local area or wide area), the security mechanism is more of an afterthought. Attacks on wireless networks are quite uncommon even though they are deployed quite widely. However, the extent of deployment of wireless networks is a small fraction of the reach of wired networks. As the penetration of the wireless medium increases, the problems with wireless security are bound to become more significant. Even today, we are aware of many weak points that exist in current wireless network designs, and we can be certain that many more will be discovered.

UR - http://www.scopus.com/inward/record.url?scp=84899286781&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84899286781&partnerID=8YFLogxK

M3 - Chapter

AN - SCOPUS:84899286781

SN - 9780849323232

SP - 501

EP - 521

BT - Handbook of Wireless Local Area Networks

PB - CRC Press

ER -