• DocumentCode
    1828548
  • Title

    Choosing the right wireless LAN security protocol for the home and business user

  • Author

    Maple, Carsten ; Jacobs, Helen ; Reeve, Matthew

  • Author_Institution
    Inst. for Res. in Applicable Computing, Univ. of Luton, UK
  • fYear
    2006
  • fDate
    20-22 April 2006
  • Abstract
    The introduction and evolution of security standards for wireless networking has been a problematic process. Flaws in the initial security standard resulted in quick-fix solutions and interoperability issues. As wireless networks are not confined to a building, there is an added security risk that radio signals can be detected externally. Wireless networking has rapidly increased in popularity over the last few years due to the flexibility it provides. Given the simultaneous growth of e-government services there is particular risk to the citizen of identity theft. This article discusses the progression of wireless security protocols since their introduction and the effect this has had on home and business users. The risks of using wireless networks are outlined in the paper and recommendations for securing wireless networks are reviewed.
  • Keywords
    home automation; office automation; open systems; protocols; security of data; telecommunication security; wireless LAN; business user; e-government service; home user; identity theft; interoperability; radio signal; security protocol; wireless LAN; Access protocols; Authentication; Communication system security; Cryptography; Data security; Electronic government; Jacobian matrices; Wireless LAN; Wireless application protocol; Wireless networks; TKIP; WEP; WLANs; WPA; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on
  • Print_ISBN
    0-7695-2567-9
  • Type

    conf

  • DOI
    10.1109/ARES.2006.42
  • Filename
    1625420