Skip to Content
From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband
book

From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband

by Martin Sauter
March 2011
Intermediate to advanced
450 pages
18h 25m
English
Wiley
Content preview from From GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband

6.7 Wireless LAN Security

WLAN security is a widely discussed topic as using a wireless network without encryption exposes users to many security risks.

In some cases, access points are still sold with encryption deactivated by default. If encryption is not configured by the owner of the network, any wireless device can access the network without prior authorization. This configuration is used in most public hotspots as it allows users to easily find and use the network. As the frames are not encrypted, however, it is easy to eavesdrop on their activities. Without protection on the network layer, it is left to the users to use virtual private network (VPN) tunnels and take other measures to protect themselves.

The use of such an open configuration for private home networks that use the wireless network to access the Internet is even more critical. If encryption is not activated, neighbors can use the Internet connection without the knowledge of the owner of the Internet connection. Furthermore, it is possible to spy on the transmitted frames, for example to collect passwords, in the same way as it is possible in public Wi-Fi networks. As open access points also allow an eavesdropper to gain access to any PC that is connected to the wireless network, it potentially allows him to exploit weaknesses of operating systems which could then enable him to read, modify or destroy information.

Figure 6.20 WEP encryption.

6.7.1 Wired Equivalent Privacy (WEP)

To protect WLANs from unauthorized ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

Abd-Elhamid M. Taha, Hossam S. Hassanein, Najah Abu Ali
4G: LTE/LTE-Advanced for Mobile Broadband, 2nd Edition

4G: LTE/LTE-Advanced for Mobile Broadband, 2nd Edition

Erik Dahlman, Stefan Parkvall, Johan Skold

Publisher Resources

ISBN: 9780470978221Purchase book