• Login
    View Item 
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Research in Distributed Technologies (CREDIT)
    • View Item
    •   Home
    • IRAC Institute for Research in Applicable Computing - to April 2016
    • Centre for Research in Distributed Technologies (CREDIT)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UOBREPCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartmentThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalDepartment

    My Account

    LoginRegister

    About

    AboutLearning ResourcesResearch Graduate SchoolResearch InstitutesUniversity Website

    Statistics

    Display statistics

    Choosing the right wireless LAN security protocol for the home and business user

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Authors
    Maple, Carsten
    Jacobs, Helen
    Reeve, Matthew
    Issue Date
    2006
    Subjects
    TKIP
    WEP
    WLAN
    computer security
    wireless networks
    
    Metadata
    Show full item record
    Abstract
    The introduction and evolution of security standards for wireless networking has been a problematic process. Flaws in the initial security standard resulted in quick-fix solutions and interoperability issues. As wireless networks are not confined to a building, there is an added security risk that radio signals can be detected externally. Wireless networking has rapidly increased in popularity over the last few years due to the flexibility it provides. Given the simultaneous growth of e-government services there is particular risk to the citizen of identity theft. This article discusses the progression of wireless security protocols since their introduction and the effect this has had on home and business users. The risks of using wireless networks are outlined in the paper and recommendations for securing wireless networks are reviewed.
    Citation
    Maple, C., Jacobs, H., and Reeve, M. (2006) “Choosing the Right Wireless LAN Security Protocol for the Home and Business User”, in First International Conference on Availability, Reliability and Security (ARES06), Vienna University of Technology, pp. 1025-1032.
    Publisher
    IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
    URI
    http://hdl.handle.net/10547/270894
    DOI
    10.1109/ARES.2006.42
    Additional Links
    http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1625420
    Type
    Conference papers, meetings and proceedings
    Language
    en
    ISBN
    0769525679
    ae974a485f413a2113503eed53cd6c53
    10.1109/ARES.2006.42
    Scopus Count
    Collections
    Centre for Research in Distributed Technologies (CREDIT)

    entitlement

     
    DSpace software (copyright © 2002 - 2021)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.