A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs

Wireless network technology has been available for public and private use for almost two decades. The casual approach to security with the early standards and channel selection began to cause issues when the initial security standard, WEP, was discovered to have serious flaws. The closer examination of security and efficiency that followed led to better security protocols, easier setup and better guidelines to ensure efficiency of radio communications. A survey of 5 areas throughout New Zealand was conducted and this is compared with a survey of 5 areas around Perth in Western Australia. The results indicate that whilst improvements continue to be made in security implementations, a small percentage of users do not implement their networks with the recommended settings. Whilst Australian users are slightly better at complying with recommendations, it is clear that some work still needs to be done in the areas of security and efficiency.

[1]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[2]  Arash Habibi Lashkari,et al.  A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[3]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[4]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[5]  Elaine B. Barker,et al.  Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.

[6]  Russ Housley,et al.  Security flaws in 802.11 data link protocols , 2003, CACM.