Skip to main content

A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9722))

Included in the following conference series:

  • 1678 Accesses

Abstract

Wireless network technology has been available for public and private use for almost two decades. The casual approach to security with the early standards and channel selection began to cause issues when the initial security standard, WEP, was discovered to have serious flaws. The closer examination of security and efficiency that followed led to better security protocols, easier setup and better guidelines to ensure efficiency of radio communications. A survey of 5 areas throughout New Zealand was conducted and this is compared with a survey of 5 areas around Perth in Western Australia. The results indicate that whilst improvements continue to be made in security implementations, a small percentage of users do not implement their networks with the recommended settings. Whilst Australian users are slightly better at complying with recommendations, it is clear that some work still needs to be done in the areas of security and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Walker, J.: Unsafe at any key size, An analysis of the WEP encapsulation (2000). http://www.dis.org/wl/pdf/unsafe.pdf. Accessed 19 July 2005

  2. Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Arbaugh, W.A., et al.: Your 80211 Wireless Network has no Clothes. IEEE Wirel. Commun. 9(6), 44–51 (2002)

    Article  Google Scholar 

  4. Stubblefield, A., Loannidis, J., Rubin, A.: Using the Fluhrer, Mantin, and Shamir attack to break WEP. In: Network and Distributed Systems Security Symposium (2002)

    Google Scholar 

  5. Cam-Winget, N., et al.: Security flaws in 802.11 data link protocols. Commun. ACM 46(5), 35–39 (2003)

    Article  Google Scholar 

  6. Vibhuti, S.: IEEE 802.11 WEP (Wired Equivalent Privacy) Concepts and Vulnerability (2005)

    Google Scholar 

  7. Walker, J.: 802.11 Security Series Part III: AES Based Encapsulations of 802.11 Data. http://jcbserver.uwaterloo.ca/cs436/handouts/miscellaneous/Intel_Wireless_1.pdf (2003). Accessed 19 July 2005

  8. Nechvatal, J., et al.: Report on the Development of the Advanced Encryption Standard (AES), 2nd edn., October 2000. 19th January 2007

    Google Scholar 

  9. WiFi Alliance Introducing WiFi Protected Setup (2007)

    Google Scholar 

  10. Lashkari, A.H., Danesh, M.M.S., Samadi, B.: A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In: 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009 (2009)

    Google Scholar 

  11. Kirk, J.: In Australia Secure Your Wi-Fi or Face a Visit From the Police (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alastair Nisbet .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Nisbet, A., Woodward, A. (2016). A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs. In: Liu, J., Steinfeld, R. (eds) Information Security and Privacy. ACISP 2016. Lecture Notes in Computer Science(), vol 9722. Springer, Cham. https://doi.org/10.1007/978-3-319-40253-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-40253-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-40252-9

  • Online ISBN: 978-3-319-40253-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics