Issue No. 07 - July (2005 vol. 38)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2005.241
Kjell J. Hole , University of Bergen
Erlend Dyrnes , Ernst & Young--Bergen
Per Thorsheim , EDB Business Partner
Hackers can decrypt and read data on a wireless link protected by built-in WEP encryption, and they may even be able to access the data on a wired network through a Wi-Fi access point. The authors assess Wi-Fi network security in one city, analyze alternative security techniques, and suggest ways to secure such networks.
Wi-Fi networks, wireless security, wireless hacking, virtual private networks
E. Dyrnes, K. J. Hole and P. Thorsheim, "Securing Wi-Fi Networks," in Computer, vol. 38, no. , pp. 28-34, 2005.