Vulnerability of Wireless Networks to Interception

Download
Author
Jenn, David C.
Pin, Lim Wee
Sumagaysay, Paul P.
Date
2004Metadata
Show full item recordAbstract
This paper examines the vulnerability of wireless systems to interception, and provides
some simple steps that can be taken to improve security. A commercially available
computational electromagnetics software package was used to predict signal levels in
complex indoor and urban environments. The simulation results can be used to
determine the detection range of the network. Two basic scenarios are presented: (1)
indoor-to-outdoor propagation for a local area network operating in a two story
building, and (2) a wireless point-to-point link on an airbase. The simulations
illustrate some of the unique propagation conditions that occur inside of buildings and
in urban areas. This research has identified several possible system weaknesses and
suggested some simple, yet effective, methods of improving security.
Description
Journal of Information Warfare, Vol. 3, No. 2 (2004), p. 40
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Computer wireless networks : a design plan for building wireless networks using IEEE 802.11 standard
Almantheri, Hamed (Monterey, California. Naval Postgraduate School, 2003-03);In spite of the fact that wireless network technology has been available for long period of time, there has been very limited wireless networks deployments around the world before 1997 due to the lack of widely recognized ... -
Enterprise implementations of wireless network technologies at the Naval Postgraduate School and other military educational institutions
Roth, Joseph L. (Monterey, California. Naval Postgraduate School, 2002-09);The purpose of all information systems is to assist people in transitioning data into information, and then information into knowledge. In order to reach IT modernity, three things need to occur: a convergence of single ... -
Wireless Local Area Network (WLAN) vulnerability assessment and security
Goodwin, Michael S. (Monterey California. Naval Postgraduate School, 2005-09);"The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC). This threat ...