Abstract
Wireless network technology has been available for public and private use for almost two decades. The casual approach to security with the early standards and channel selection began to cause issues when the initial security standard, WEP, was discovered to have serious flaws. The closer examination of security and efficiency that followed led to better security protocols, easier setup and better guidelines to ensure efficiency of radio communications. A survey of 5 areas throughout New Zealand was conducted and this is compared with a survey of 5 areas around Perth in Western Australia. The results indicate that whilst improvements continue to be made in security implementations, a small percentage of users do not implement their networks with the recommended settings. Whilst Australian users are slightly better at complying with recommendations, it is clear that some work still needs to be done in the areas of security and efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Walker, J.: Unsafe at any key size, An analysis of the WEP encapsulation (2000). http://www.dis.org/wl/pdf/unsafe.pdf. Accessed 19 July 2005
Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)
Arbaugh, W.A., et al.: Your 80211 Wireless Network has no Clothes. IEEE Wirel. Commun. 9(6), 44–51 (2002)
Stubblefield, A., Loannidis, J., Rubin, A.: Using the Fluhrer, Mantin, and Shamir attack to break WEP. In: Network and Distributed Systems Security Symposium (2002)
Cam-Winget, N., et al.: Security flaws in 802.11 data link protocols. Commun. ACM 46(5), 35–39 (2003)
Vibhuti, S.: IEEE 802.11 WEP (Wired Equivalent Privacy) Concepts and Vulnerability (2005)
Walker, J.: 802.11 Security Series Part III: AES Based Encapsulations of 802.11 Data. http://jcbserver.uwaterloo.ca/cs436/handouts/miscellaneous/Intel_Wireless_1.pdf (2003). Accessed 19 July 2005
Nechvatal, J., et al.: Report on the Development of the Advanced Encryption Standard (AES), 2nd edn., October 2000. 19th January 2007
WiFi Alliance Introducing WiFi Protected Setup (2007)
Lashkari, A.H., Danesh, M.M.S., Samadi, B.: A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In: 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009 (2009)
Kirk, J.: In Australia Secure Your Wi-Fi or Face a Visit From the Police (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Nisbet, A., Woodward, A. (2016). A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs. In: Liu, J., Steinfeld, R. (eds) Information Security and Privacy. ACISP 2016. Lecture Notes in Computer Science(), vol 9722. Springer, Cham. https://doi.org/10.1007/978-3-319-40253-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-40253-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-40252-9
Online ISBN: 978-3-319-40253-6
eBook Packages: Computer ScienceComputer Science (R0)