This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Securing Wi-Fi Networks
July 2005 (vol. 38 no. 7)
pp. 28-34
Kjell J. Hole, University of Bergen
Erlend Dyrnes, Ernst & Young--Bergen
Per Thorsheim, EDB Business Partner
Hackers can decrypt and read data on a wireless link protected by built-in WEP encryption, and they may even be able to access the data on a wired network through a Wi-Fi access point. The authors assess Wi-Fi network security in one city, analyze alternative security techniques, and suggest ways to secure such networks.
Index Terms:
Wi-Fi networks, wireless security, wireless hacking, virtual private networks
Citation:
Kjell J. Hole, Erlend Dyrnes, Per Thorsheim, "Securing Wi-Fi Networks," Computer, vol. 38, no. 7, pp. 28-34, July 2005, doi:10.1109/MC.2005.241
Usage of this product signifies your acceptance of the Terms of Use.