Wireless network security for users

被引:4
|
作者
Russell, SF [1 ]
机构
[1] Iowa State Univ, Ames, IA 50011 USA
关键词
D O I
10.1109/ITCC.2001.918786
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network security technology generally concentrations on protection of the network infrastructure and, by implication, the protection of the user. While this is role for the larger public network, the local network environment of the user is very vulnerable to denial-of-service. "man-in-the-middle," and other attacks that can be devastating. In this paper, we examine the issues of wireless security from the perspective of the user and the local network. We will look at airlink attacks by specialized transmitters a,ld intercept receivers. Examples rr ill be taken from the technologies used in IS-95 CDMA cellular radiotelephone and IEEE 802.11 wireless LANs.
引用
收藏
页码:172 / 177
页数:6
相关论文
共 50 条
  • [21] Security and application of wireless sensor network
    Zhang Huanan
    Xing Suping
    Wang Jiannan
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY, 2021, 183 : 486 - 492
  • [22] Wireless Network Security: Tough Times
    Wadhwa, Utkarsh
    2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 1022 - 1025
  • [23] Security mechanisms for Wireless Home Network
    Zhuge, J
    Yao, R
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1527 - 1531
  • [24] Security architectures in wireless sensor network
    Bhasin V.
    Kumar S.
    Saxena P.C.
    Katti C.P.
    International Journal of Information Technology, 2020, 12 (1) : 261 - 272
  • [25] SECURITY ISSUES IN A CDPD WIRELESS NETWORK
    FRANKEL, Y
    HERZBERG, A
    KARGER, PA
    KRAWCZYK, H
    KUNZINGER, CA
    YUNG, MT
    IEEE PERSONAL COMMUNICATIONS, 1995, 2 (04): : 16 - 27
  • [26] Defense and security of a wireless tactical network
    Younger, M
    Young, S
    DIGITAL WIRELESS COMMUNICATION III, 2001, 4395 : 224 - 232
  • [27] Research on Wireless Network Security Model
    Linmao
    Wangyong
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 785 - 790
  • [28] Designing of Security Hardware for Wireless Network
    Ozalp, Murat
    Karakuzu, Cihan
    Zengin, Ahmet
    2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 244 - 247
  • [29] Network Security Through Wireless Location
    Peres, Andre
    Weber, Raul Fernando
    2009 LATIN AMERICAN NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2009, : 33 - +
  • [30] Wireless Network Security: Building on Erasures
    Fragouli, Christina
    Prabhakaran, Vinod M.
    Czap, Laszlo
    Diggavi, Suhas N.
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1826 - 1840