The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2008 vol.6)
pp: 14-20
Kjell J. Hole , Department of Informatics, University of Bergen
Lars-Helge Netland , Department of Informatics, University of Bergen
Yngve Espelid , Bouvet ASA
Andr? N. Klingsheim , Department of Informatics, University of Bergen
Hallvar Helleseth , Avenir AS
Jan B. Henriksen , Department of Informatics, University of Bergen
ABSTRACT
Open wireless networks raise privacy issues and entail increased risk of malicious attacks and illegal downloading activities. Such networks are nonetheless attractive—particularly to universities—because they enhance usability and thus expand access to nonsensitive system resources. At universities, such access brings numerous benefits to students, faculty, and the surrounding community alike. Here, the authors describe the challenges of removing individual user authentication requirements at the perimeter of a university network in which mobile device users access system resources over wireless links to the wired infrastructure. The authors discuss how to mitigate the security and privacy risks entailed in an open network of this sort, and also describe how IT departments can vary the network's degree of openness.
INDEX TERMS
authentication, wireless communication, risk analysis, security, wireless networks, open wireless, campus
CITATION
Kjell J. Hole, Lars-Helge Netland, Yngve Espelid, Andr? N. Klingsheim, Hallvar Helleseth, Jan B. Henriksen, "Open Wireless Networks on University Campuses", IEEE Security & Privacy, vol.6, no. 4, pp. 14-20, July/August 2008, doi:10.1109/MSP.2008.92
REFERENCES
1. R.B. Kvavik and J.B. Caruso, ECAR Study of Students and Information Technology, 2005: Convenience, Connection, Control, and Learning, Educause Center for Applied Research, vol. 6, 2005; www.educause.eduers0506.
2. L.F. Cranor and S. Garfinkel eds., Security and Usability, O'Reilly, 2005.
3. R.E. Smith, Authentication, Addison-Wesley, 2001.
4. S.T. Kent and L.I. Millett, eds., Who Goes There?, US Nat'l Academies Press, 2003.
5. P. Kuper, "A Warning to Industry—Fix It or Lose It," IEEE Security &Privacy, vol. 4, no. 2, 2006, pp. 56–60.
6. R. Bejtlich, The Tao of Network Security Monitoring, Addison-Wesley, 2005.
7. A. Jones and D. Ashenden, Risk Management for Computer Security, Elsevier, 2005.
8. K.J. Hole, E. Dyrnes, and P. Thorsheim, "Securing Wi-Fi Networks," Computer, vol. 38, no. 7, 2005, pp. 28–34.
9. S. Bibb and J. Kourdi, Trust Matters, Palgrave Macmillan, 2004.
10. H. Cavusoglu, B. Mishra, and S. Raghunathan, "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers," Int'l J. Electronic Commerce, vol. 9, no. 1, 2004, pp. 69–104.
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool