Title :
Wireless security threat taxonomy
Author :
Welch, Donald ; Lathrop, Scott
Abstract :
Several papers have published very specific threats to wireless networks; specifically in the area of attacks against the IEEE 802.11 Wired Equivalency Protocol (WEP). Other papers have addressed wireless attacks based on the attack models used in wired networks. However, the different characteristics of wireless networks require looking at the threat differently. We present a wireless threat taxonomy that we used to build the security architecture for the wireless network at West Point.
Keywords :
IEEE standards; computer crime; message authentication; protocols; telecommunication security; transport protocols; wireless LAN; IEEE 802.11 Wired Equivalency Protocol; WEP; information assurance; security architecture; wireless network attack; wireless security threat taxonomy; Access protocols; Communication system security; Frequency; Information security; Taxonomy; Telecommunication traffic; Wireless LAN; Wireless application protocol; Wireless networks; Wireless personal area networks;
Conference_Titel :
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
Print_ISBN :
0-7803-7808-3
DOI :
10.1109/SMCSIA.2003.1232404