Vulnerability of Wireless Networks to Interception
Jenn, David C.
Pin, Lim Wee
Sumagaysay, Paul P.
MetadataShow full item record
This paper examines the vulnerability of wireless systems to interception, and provides some simple steps that can be taken to improve security. A commercially available computational electromagnetics software package was used to predict signal levels in complex indoor and urban environments. The simulation results can be used to determine the detection range of the network. Two basic scenarios are presented: (1) indoor-to-outdoor propagation for a local area network operating in a two story building, and (2) a wireless point-to-point link on an airbase. The simulations illustrate some of the unique propagation conditions that occur inside of buildings and in urban areas. This research has identified several possible system weaknesses and suggested some simple, yet effective, methods of improving security.
Journal of Information Warfare, Vol. 3, No. 2 (2004), p. 40
Showing items related by title, author, creator and subject.
Computer wireless networks : a design plan for building wireless networks using IEEE 802.11 standard Almantheri, Hamed (Monterey, California. Naval Postgraduate School, 2003-03);In spite of the fact that wireless network technology has been available for long period of time, there has been very limited wireless networks deployments around the world before 1997 due to the lack of widely recognized ...
Goodwin, Michael S. (Monterey California. Naval Postgraduate School, 2005-09);"The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC). This threat ...
Enterprise implementations of wireless network technologies at the Naval Postgraduate School and other military educational institutions Roth, Joseph L. (Monterey, California. Naval Postgraduate School, 2002-09);The purpose of all information systems is to assist people in transitioning data into information, and then information into knowledge. In order to reach IT modernity, three things need to occur: a convergence of single ...