Wireless Network Security Vulnerabilities and Concerns

The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet’s expansion for popular use...

Full description

Saved in:
Bibliographic Details
Published inSecurity Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 207 - 219
Main Author Mushtaq, Ahmad
Format Book Chapter
LanguageEnglish
Published Germany Springer Berlin / Heidelberg 2010
Springer Berlin Heidelberg
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text
ISBN3642176097
9783642176098
ISSN1865-0929
1865-0937
DOI10.1007/978-3-642-17610-4_23

Cover

Abstract The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet’s expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other’s defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.
AbstractList The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet’s expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other’s defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.
Author Mushtaq, Ahmad
Author_xml – sequence: 1
  givenname: Ahmad
  surname: Mushtaq
  fullname: Mushtaq, Ahmad
  email: mushtaq_ahmad@hotmail.com
  organization: Ghulam Ishaq Khan Institute, Topi
BookMark eNo9kMtOwzAQRQ0URFv6ByzyAwE7dsfxElUUkCpY8FpasT2B0MgJdirE3-M-xCxmpHt1RzNnQka-80jIJaNXjFJ5rWSZ8xxEkTMJjOZCF_yIzJLMk7jTxDEZsxLmOVVcnpDJwaBKjv6NQp2RMSRfqrJU52QW4xdNJQRIkGMC703AFmPMHnH46cI6e0a7Cc3wm71tWo-hMk3bDA3GrPIuW3TeYvDxgpzWVRtxdphT8rq8fVnc56unu4fFzSrv2bxM5xtLXVFzyaB2cyvBGlYZx5kpRaGcUY7bunLWQG1obVVqwJXlKBQFwSSfkmK_N_ah8R8YtOm6ddSM6i0lnXBortPfekdEbymlkNiH-tB9bzAOGrcpi34IVWs_q37AEDWnAEwyXQDViRv_Aw_vaDc
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2010
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2010
DBID FFUUA
DOI 10.1007/978-3-642-17610-4_23
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783642176104
3642176100
EISSN 1865-0937
Editor Fang, Wai-Chi
Kang, Heau-jo
Arnett, Kirk P
Khurram Khan, Muhammad
Ślęzak, Dominik
Editor_xml – sequence: 1
  fullname: Fang, Wai-Chi
– sequence: 2
  fullname: Ślęzak, Dominik
– sequence: 3
  fullname: Kang, Heau-jo
– sequence: 4
  fullname: Arnett, Kirk P
– sequence: 5
  fullname: Khurram Khan, Muhammad
EndPage 219
ExternalDocumentID EBC3066171_260_217
GroupedDBID -T.
089
0D6
0DA
20A
38.
4UP
4V3
9-X
A4J
AABBV
ABBVZ
ABMKK
ABMNI
ACDPG
ACZTO
ADVHH
AEJLV
AEKFX
AEOKE
AETDV
AEZAY
AHSMR
ALMA_UNASSIGNED_HOLDINGS
AZZ
BBABE
CZZ
FFUUA
I4C
IEZ
JJU
MA.
MYL
SBO
SNUHX
TBMHI
TPJZQ
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
29F
RSU
ID FETCH-LOGICAL-p1583-6bc0d2f3716fd5c76cb1abd31b8429db9d3cfadcb6fb0fc9b0f639c3e49064173
ISBN 3642176097
9783642176098
ISSN 1865-0929
IngestDate Tue Jul 29 19:59:24 EDT 2025
Wed May 28 23:38:58 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum QA75.5-76.95
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p1583-6bc0d2f3716fd5c76cb1abd31b8429db9d3cfadcb6fb0fc9b0f639c3e49064173
OCLC 693779889
PQID EBC3066171_260_217
PageCount 13
ParticipantIDs springer_books_10_1007_978_3_642_17610_4_23
proquest_ebookcentralchapters_3066171_260_217
PublicationCentury 2000
PublicationDate 2010
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – year: 2010
  text: 2010
PublicationDecade 2010
PublicationPlace Germany
PublicationPlace_xml – name: Germany
– name: Berlin, Heidelberg
PublicationSeriesTitle Communications in Computer and Information Science
PublicationSubtitle International Conferences, SecTech and DRBC 2010, Held As Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings
PublicationTitle Security Technology, Disaster Recovery and Business Continuity
PublicationYear 2010
Publisher Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin / Heidelberg
– name: Springer Berlin Heidelberg
SSID ssj0000446767
ssj0000580895
ssib054953581
Score 1.3627589
Snippet The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of...
SourceID springer
proquest
SourceType Publisher
StartPage 207
SubjectTerms Hacking
Internet
Intrusion
Network Security
Protocol
Wireless Network Security
Title Wireless Network Security Vulnerabilities and Concerns
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066171&ppg=217
http://link.springer.com/10.1007/978-3-642-17610-4_23
Volume 122
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwELVoWYCBb_GtDGxVUFI7TjJCVYQQMAHqZsV2LFWqAqLtAL-eOztJ09ClLFYUpY7r51h353vvCLlWClYBT5XPOJXgoNC-n8Uy9o3J0zxhfR1qjEM-v_CHN_Y4ikaL0neWXTKTN-pnJa_kP6jCPcAVWbJrIFt3CjfgGvCFFhCGtmX8LodZHYejrDzXiI7bDWQ8zVD8AA1CTM90-kp1fjuqUY2L-Xj23VwsmAM7cXuezQrv1Z2_zyeoS21TaMGptp0NkOr4VSxFDGziWTNiUEUMe6WgFsqjrxLVsgQPBi4LD1yh6HrDdEziP5tvM98Cfojak_ByJhyheFnruu8Ymy2t6-HdAFwYMKpCAX6WgIc6pBMnrEs2b4ePT-919AyPoWOOBRfrIcZOTmkx5AZRctWYllyK1im4NS5e98gOEk48ZILAKPfJRl4ckN2q3IZX7r4HZLuhHXlIeIWZV2LmVZh5Lcw8wMyrMDsib_fD18GDXxbB8D_DKIFBSxXovqHg1xodqZgrGWZS01DCl5RqmWqqTKaV5EYGRqXQgNGpaM5SsDbDmB6TbvFR5CfE0yYGA17lHMmNNEpkoAKVJZrxyLDERKfEr2ZE2KP6Mj9Yuf8_FS1sTkmvmjaBj09FpYEN8y2ogPcIO98C5_tszd7PydZi8V6Q7uxrnl-CATiTV-Vq-AWKUleU
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+Technology%2C+Disaster+Recovery+and+Business+Continuity&rft.atitle=Wireless+Network+Security+Vulnerabilities+and+Concerns&rft.date=2010-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642176098&rft.volume=122&rft_id=info:doi/10.1007%2F978-3-642-17610-4_23&rft.externalDBID=217&rft.externalDocID=EBC3066171_260_217
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066171-l.jpg