skip to main content
article

WiFi Security: Negotiating WiFi security

Published: 01 February 2010 Publication History

Abstract

Wireless networks are desirable to many organisations because they increase workforce flexibility and save cabling costs. In older offices, listed buildings, and businesses based in the outdoors, wireless maybe the only way to provide network access to all parts of the workplace environment. Some businesses even provide wireless networks to reach out to visitors and customers to entice them into their premises and allow them to work from there. Wireless networks will enable the coming myriad of tablet and slate machines to function as seamless internet terminals. They are here to stay.

References

[1]
<http://www.ofcom.org.uk/radiocomms/isu/ukfat/ukfat08.pdf>
[2]
http://news.bbc.co.uk/1/hi/england/london/6958429.stm
[3]
<http://http.hmso.gov.uk/acts/acts2003/20030021.htm>
[4]
IEEE Std 802.11-1997 Information Technology-telecommunications And Information exchange Between Systems-Local And Metropolitan Area Networks-specific Requirements-part 11: Wireless Lan Medium Access Control (MAC) And Physical Layer (PHY) Specifications, IEEE, 1997, http://ieeexplore.ieee.org/search/freesrchabstract.jsp?arnumber=654749&isnumber=14251&punumber=5258&k2dockey=654749@ieeestds&query=%28802.11+1997%29%3Cin%3Emetadata&pos=0
[5]
<http://www.backtrack-linux.org/downloads/>
[6]
<http://www.klcconsulting.net/change_mac_w2k.htm>
[7]
<http://www.churchofwifi.org/default.asp?PageLink=Project_Display.asp?PID=90>
[8]
<http://www.wpacracker.com/>
[9]
<http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol>
[10]
<http://en.wikipedia.org/wiki/802.1X>
[11]
<http://dl.aircrack-ng.org/breakingwepandwpa.pdf>
[12]
<http://en.wikipedia.org/wiki/CCMP>

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Network Security
Network Security  Volume 2010, Issue 2
February, 2010
26 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 February 2010

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media