Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Our goal is to provide privacy and integrity to the data, to authenticate the sender, to prevent replay attacks and to prevent traffic analysis; consequently, the entire communication is encrypted (with one exception which will be explained). All communications consist of a preamble, header and payload. The format of all communications (sensor nodes and the base station) consist of a preamble, header and payload. The preamble is empty if the communication originates from the base station and is directed to a sensor, otherwise it contains the address of the sending node. The header contains the recipient’s address, nonce and a command and is encrypted under. | International Journal of Multimedia and Ubiquitous Engineering Vol. 3 No. 3 July 2008 Wireless Network Security Vulnerabilities Threats and Countermeasures Min-kyu Choi1 Rosslin John Robles1 Chang-hwa Hong2 Tai-hoon Kim1 School of Multimedia Hannam University Daejeon Korea puremiroa@naver.com rosslinjohn@yahoo.com taihoonn@hannam.ac.kr Abstract Wireless networking provides many advantages but it also coupled with new security threats and alters the organization s overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities wireless security is primarily a management issue. Effective management of the threats associated with wireless technology requires a sound and thorough assessment of risk given the environment and development of a plan to mitigate identified threats. We present a framework to help managers understand and assess the various threats associated with the use of wireless technology. We also discuss a number of available solutions for countering those threats. Keywords Wireless Network Wireless Security Wireless Threats Signal-Hiding 1. Introduction Wireless networking presents many advantages Productivity improves because of increased accessibility to information resources. Network configuration and reconfiguration is easier faster and less expensive. However wireless technology also creates new threats and alters the existing information security risk profile. For example because communications takes place through the air using radio frequencies the risk of interception is greater than with wired networks. If the message is not encrypted or encrypted with a weak algorithm the attacker can read it thereby compromising confidentiality. Although wireless networking alters the risks associated with various threats to security the overall security objectives remain the same as with wired networks preserving confidentiality ensuring integrity and .