
Attacks on Wireless LANs
About the security of IEEE 802.11 based wireless networks
Versandkostenfrei!
Versandfertig in 6-10 Tagen
38,99 €
inkl. MwSt.
PAYBACK Punkte
19 °P sammeln!
Wireless LANs can be found nearly everywhere today.Most mobile computersship with built-in wireless LAN hardware by defaultand most other computerscan be equipped with additional hardware.Because all data is transmitted wirelessly, extrasecurity is needed in thesenetworks.This was a concern to the creators of the IEEE802.11 standard, who designed a simple protocolcalled WEP which stands forWired Equivalent Privacy to protect such networks.Unfortunately, the WEP protocol has some seriousdesign flaws and various attacks are possible againstWEP protected networks. This book presents nearly allcur...
Wireless LANs can be found nearly everywhere today.
Most mobile computers
ship with built-in wireless LAN hardware by default
and most other computers
can be equipped with additional hardware.
Because all data is transmitted wirelessly, extra
security is needed in these
networks.
This was a concern to the creators of the IEEE
802.11 standard, who designed a simple protocol
called WEP which stands for
Wired Equivalent Privacy to protect such networks.
Unfortunately, the WEP protocol has some serious
design flaws and various attacks are possible against
WEP protected networks. This book presents nearly all
currently known attacks on the WEP protocol,
including their theoretical background and their
implementation. This book is intended for network
operators, who want to learn more about wireless
security, and also for cryptographers, who want to
understand the theoretical background of these attacks.
Most mobile computers
ship with built-in wireless LAN hardware by default
and most other computers
can be equipped with additional hardware.
Because all data is transmitted wirelessly, extra
security is needed in these
networks.
This was a concern to the creators of the IEEE
802.11 standard, who designed a simple protocol
called WEP which stands for
Wired Equivalent Privacy to protect such networks.
Unfortunately, the WEP protocol has some serious
design flaws and various attacks are possible against
WEP protected networks. This book presents nearly all
currently known attacks on the WEP protocol,
including their theoretical background and their
implementation. This book is intended for network
operators, who want to learn more about wireless
security, and also for cryptographers, who want to
understand the theoretical background of these attacks.