TAILIEUCHUNG - Wireless Network Security: Vulnerabilities, Threats and Countermeasures

Our goal is to provide privacy and integrity to the data, to authenticate the sender, to prevent replay attacks and to prevent traffic analysis; consequently, the entire communication is encrypted (with one exception which will be explained). All communications consist of a preamble, header and payload. The format of all communications (sensor nodes and the base station) consist of a preamble, header and payload. The preamble is empty if the communication originates from the base station and is directed to a sensor, otherwise it contains the address of the sending node. The header contains the recipient’s address, nonce and a command and is encrypted under. | International Journal of Multimedia and Ubiquitous Engineering Vol. 3 No. 3 July 2008 Wireless Network Security Vulnerabilities Threats and Countermeasures Min-kyu Choi1 Rosslin John Robles1 Chang-hwa Hong2 Tai-hoon Kim1 School of Multimedia Hannam University Daejeon Korea puremiroa@ rosslinjohn@ taihoonn@ Abstract Wireless networking provides many advantages but it also coupled with new security threats and alters the organization s overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities wireless security is primarily a management issue. Effective management of the threats associated with wireless technology requires a sound and thorough assessment of risk given the environment and development of a plan to mitigate identified threats. We present a framework to help managers understand and assess the various threats associated with the use of wireless technology. We also discuss a number of available solutions for countering those threats. Keywords Wireless Network Wireless Security Wireless Threats Signal-Hiding 1. Introduction Wireless networking presents many advantages Productivity improves because of increased accessibility to information resources. Network configuration and reconfiguration is easier faster and less expensive. However wireless technology also creates new threats and alters the existing information security risk profile. For example because communications takes place through the air using radio frequencies the risk of interception is greater than with wired networks. If the message is not encrypted or encrypted with a weak algorithm the attacker can read it thereby compromising confidentiality. Although wireless networking alters the risks associated with various threats to security the overall security objectives remain the same as with wired networks preserving confidentiality ensuring integrity and .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.