Wireless Network Security Vulnerabilities and Concerns
The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet’s expansion for popular use...
Saved in:
Published in | Security Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 207 - 219 |
---|---|
Main Author | |
Format | Book Chapter |
Language | English |
Published |
Germany
Springer Berlin / Heidelberg
2010
Springer Berlin Heidelberg |
Series | Communications in Computer and Information Science |
Subjects | |
Online Access | Get full text |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 1865-0937 |
DOI | 10.1007/978-3-642-17610-4_23 |
Cover
Abstract | The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet’s expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other’s defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed. |
---|---|
AbstractList | The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet’s expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other’s defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed. |
Author | Mushtaq, Ahmad |
Author_xml | – sequence: 1 givenname: Ahmad surname: Mushtaq fullname: Mushtaq, Ahmad email: mushtaq_ahmad@hotmail.com organization: Ghulam Ishaq Khan Institute, Topi |
BookMark | eNo9kMtOwzAQRQ0URFv6ByzyAwE7dsfxElUUkCpY8FpasT2B0MgJdirE3-M-xCxmpHt1RzNnQka-80jIJaNXjFJ5rWSZ8xxEkTMJjOZCF_yIzJLMk7jTxDEZsxLmOVVcnpDJwaBKjv6NQp2RMSRfqrJU52QW4xdNJQRIkGMC703AFmPMHnH46cI6e0a7Cc3wm71tWo-hMk3bDA3GrPIuW3TeYvDxgpzWVRtxdphT8rq8fVnc56unu4fFzSrv2bxM5xtLXVFzyaB2cyvBGlYZx5kpRaGcUY7bunLWQG1obVVqwJXlKBQFwSSfkmK_N_ah8R8YtOm6ddSM6i0lnXBortPfekdEbymlkNiH-tB9bzAOGrcpi34IVWs_q37AEDWnAEwyXQDViRv_Aw_vaDc |
ContentType | Book Chapter |
Copyright | Springer-Verlag Berlin Heidelberg 2010 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2010 |
DBID | FFUUA |
DOI | 10.1007/978-3-642-17610-4_23 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783642176104 3642176100 |
EISSN | 1865-0937 |
Editor | Fang, Wai-Chi Kang, Heau-jo Arnett, Kirk P Khurram Khan, Muhammad Ślęzak, Dominik |
Editor_xml | – sequence: 1 fullname: Fang, Wai-Chi – sequence: 2 fullname: Ślęzak, Dominik – sequence: 3 fullname: Kang, Heau-jo – sequence: 4 fullname: Arnett, Kirk P – sequence: 5 fullname: Khurram Khan, Muhammad |
EndPage | 219 |
ExternalDocumentID | EBC3066171_260_217 |
GroupedDBID | -T. 089 0D6 0DA 20A 38. 4UP 4V3 9-X A4J AABBV ABBVZ ABMKK ABMNI ACDPG ACZTO ADVHH AEJLV AEKFX AEOKE AETDV AEZAY AHSMR ALMA_UNASSIGNED_HOLDINGS AZZ BBABE CZZ FFUUA I4C IEZ JJU MA. MYL SBO SNUHX TBMHI TPJZQ Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 29F RSU |
ID | FETCH-LOGICAL-p1583-6bc0d2f3716fd5c76cb1abd31b8429db9d3cfadcb6fb0fc9b0f639c3e49064173 |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 |
IngestDate | Tue Jul 29 19:59:24 EDT 2025 Wed May 28 23:38:58 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum | QA75.5-76.95 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p1583-6bc0d2f3716fd5c76cb1abd31b8429db9d3cfadcb6fb0fc9b0f639c3e49064173 |
OCLC | 693779889 |
PQID | EBC3066171_260_217 |
PageCount | 13 |
ParticipantIDs | springer_books_10_1007_978_3_642_17610_4_23 proquest_ebookcentralchapters_3066171_260_217 |
PublicationCentury | 2000 |
PublicationDate | 2010 |
PublicationDateYYYYMMDD | 2010-01-01 |
PublicationDate_xml | – year: 2010 text: 2010 |
PublicationDecade | 2010 |
PublicationPlace | Germany |
PublicationPlace_xml | – name: Germany – name: Berlin, Heidelberg |
PublicationSeriesTitle | Communications in Computer and Information Science |
PublicationSubtitle | International Conferences, SecTech and DRBC 2010, Held As Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings |
PublicationTitle | Security Technology, Disaster Recovery and Business Continuity |
PublicationYear | 2010 |
Publisher | Springer Berlin / Heidelberg Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
SSID | ssj0000446767 ssj0000580895 ssib054953581 |
Score | 1.3627589 |
Snippet | The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 207 |
SubjectTerms | Hacking Internet Intrusion Network Security Protocol Wireless Network Security |
Title | Wireless Network Security Vulnerabilities and Concerns |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066171&ppg=217 http://link.springer.com/10.1007/978-3-642-17610-4_23 |
Volume | 122 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwELVoWYCBb_GtDGxVUFI7TjJCVYQQMAHqZsV2LFWqAqLtAL-eOztJ09ClLFYUpY7r51h353vvCLlWClYBT5XPOJXgoNC-n8Uy9o3J0zxhfR1qjEM-v_CHN_Y4ikaL0neWXTKTN-pnJa_kP6jCPcAVWbJrIFt3CjfgGvCFFhCGtmX8LodZHYejrDzXiI7bDWQ8zVD8AA1CTM90-kp1fjuqUY2L-Xj23VwsmAM7cXuezQrv1Z2_zyeoS21TaMGptp0NkOr4VSxFDGziWTNiUEUMe6WgFsqjrxLVsgQPBi4LD1yh6HrDdEziP5tvM98Cfojak_ByJhyheFnruu8Ymy2t6-HdAFwYMKpCAX6WgIc6pBMnrEs2b4ePT-919AyPoWOOBRfrIcZOTmkx5AZRctWYllyK1im4NS5e98gOEk48ZILAKPfJRl4ckN2q3IZX7r4HZLuhHXlIeIWZV2LmVZh5Lcw8wMyrMDsib_fD18GDXxbB8D_DKIFBSxXovqHg1xodqZgrGWZS01DCl5RqmWqqTKaV5EYGRqXQgNGpaM5SsDbDmB6TbvFR5CfE0yYGA17lHMmNNEpkoAKVJZrxyLDERKfEr2ZE2KP6Mj9Yuf8_FS1sTkmvmjaBj09FpYEN8y2ogPcIO98C5_tszd7PydZi8V6Q7uxrnl-CATiTV-Vq-AWKUleU |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+Technology%2C+Disaster+Recovery+and+Business+Continuity&rft.atitle=Wireless+Network+Security+Vulnerabilities+and+Concerns&rft.date=2010-01-01&rft.pub=Springer+Berlin+%2F+Heidelberg&rft.isbn=9783642176098&rft.volume=122&rft_id=info:doi/10.1007%2F978-3-642-17610-4_23&rft.externalDBID=217&rft.externalDocID=EBC3066171_260_217 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066171-l.jpg |