Network security technology generally concentrates on protection of the network infrastructure and, by implication, protection of the user. While this is true for the larger public network, the local network environment of the user is very vulnerable to denial-of-service, "man-in-the-middle" and other attacks that can be devastating. In this paper, we examine the issues of wireless security from the perspective of the user and the local network. We look at airlink attacks by specialized transmitters and intercept receivers. Examples are taken from the technologies used in IS-95 CDMA cellular radiotelephones and IEEE 892.11 wireless LANs.
[1]
Robin Dillard.
Detectability of Spread-Spectrum Signals
,
1979,
IEEE Transactions on Aerospace and Electronic Systems.
[2]
Neal Leavitt.
Malicious Code Moves to Mobile Devices
,
2000,
Computer.
[3]
Neal Leavitt.
Will WAP Deliver the Wireless Internet?
,
2000,
Computer.
[4]
Joong Soo Ma,et al.
Mobile Communications
,
2003,
Lecture Notes in Computer Science.
[5]
Roger L. Peterson,et al.
Introduction to Spread Spectrum Communications
,
1995
.
[6]
Wenke Lee,et al.
Intrusion detection in wireless ad-hoc networks
,
2000,
MobiCom '00.