In recent years, wireless technology has drastically
changed the way we use computers, creating new
possibilities for consumer electronics to weave
themselves into everyday life. Mobile phones, PDAs
and laptops can occupy a substantial part of our
daily routines, whether we are at home, at work, or
on the road. However, along with increased mobility
this technology has created a number of new security
risks. This work provides an general overview about
wireless-network security and additionally a focus on
vulnerabilities located on the media access (MAC)
layer of IEEE 802.11-based wireless local area
networks, known as MAC address spoofing. The author
provides basic knowledge about all involved
components like wireless communication schemes and
cryptographic methods. Further on, this book deals
with the detection of MAC address spoofing based on
network device fingerprinting. Finally, it provides
the reader with a compact manual for securing IEEE
802.11-based wireless networks in home and business
environments.
changed the way we use computers, creating new
possibilities for consumer electronics to weave
themselves into everyday life. Mobile phones, PDAs
and laptops can occupy a substantial part of our
daily routines, whether we are at home, at work, or
on the road. However, along with increased mobility
this technology has created a number of new security
risks. This work provides an general overview about
wireless-network security and additionally a focus on
vulnerabilities located on the media access (MAC)
layer of IEEE 802.11-based wireless local area
networks, known as MAC address spoofing. The author
provides basic knowledge about all involved
components like wireless communication schemes and
cryptographic methods. Further on, this book deals
with the detection of MAC address spoofing based on
network device fingerprinting. Finally, it provides
the reader with a compact manual for securing IEEE
802.11-based wireless networks in home and business
environments.