Wireless Computing
[an error occurred while processing this directive]

Introduction to Wireless

Wireless Technologies

Interference

Network Security

Glossary

Bibliography


Valid XHTML 1.0!

Annotated Bibliography

¤ Arbaugh, William A. "Wireless security is different." Computer. Vol. 36, Issue 8, August 2003. pp. 99-101.

This article contains some brief discussion comparing wireless and wired network security, as well as some information dispelling common misconceptions regarding wireless security.

¤ Bing, Benny. Wireless Local Area Networks: The New Wireless Revolution. John Wiley & Sons, Inc.: New York. 2002.

¤ Geier, Jim. "802.1X Offers Authentication and Key Management." Wi-Fi Planet. http://www.wi-fiplanet.com/tutorials/article.php/1041171. Accessed 11 Sept. 2003.

This website contains information about 802.1x, which is a new authentication protocol that is being implemented as a temporary solution until another release of 802.11 covers more rigorous authentication techniques.

¤ Held, Gil. Data Over Wireless Networks: Bluetooth, WAP, & Wireless LANs. McGraw-Hill: New York. 2001.

Most of the this book explain how wireless networks work compared to wired networks. Later chapters actually look at different ways of doing wireless networks and also compares them.

¤ Ilyas, Mohammad. The Handbook of Ad Hoc Wireless Networks. CRC Press: Florida. 2003.

¤ Karygiannis, Tom and Owens, Les. "Wireless Network Security: 802.11, Bluetooth and Handheld Devices." National Institute of Standards and Technology. http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf.

This paper provides a plethora of information on how 802.11 security works, what security needs exist in wireless networks, and what kinds of encryption and authentication currently exist in wireless.

¤ LaRocca, Ruth and LaRocca, James. 802.11 Demystified: Wi-Fi Made Easy. San Francisco: McGraw-Hill, 2002.

Provides a historical background of the 802.11 standard, including extensive information on the IEEE, its standards process, and the different working-group implementations of 802.11 (.11a, .11b, .11g, etc). Also includes brief sections on spread spectrum radio techniques and on approaches to wireless security.

¤ Liu, Alex. Interview. Atheros Communications, Inc. 9/11/03.

¤ Miller, Brent A. and Chatschik Bisdikian, Ph.D. Bluetooth Revealed: The Insider’s Guide to an Open Specification for Global Wireless Communications. Prentice Hall: Upper Saddle River, New Jersey. 2002

Explains everything a user needs to know about Bluetooth. While it states problems with Bluetooth, it does not mention ways around the problems.

¤ Miller, Sandra Kay. "Facing the challenge of wireless security." Computer. Vol. 34, Issue 7, July 2001. pp. 16-18.

This article provides an overview of some of the flaws in IEEE 802.11 including direct quotes from the people involved and some of the steps they’re taking to make the technology stronger.

¤ Phifer, Lisa. "Better than WEP." ISP Fixed Wireless. 7 Feb. 2002. isp-planet.com/fixed_wireless/technology/2002/better_than_wep.html Accessed 11 Sept. 2003.

¤ Potter, Bruce. "Wireless Security’s Future." IEEE Security & Privacy Magazine. Vol. 1, Issue 4, July-Aug. 2003. pp. 68-72.

This article talks about 802.11i, the next standard for wireless networks that should provide many security fixes from WEP, including the Temporal Key Integrity Protocol and the 802.1x authentication protocol.

¤ Prasad, Ramjee and Munoz, Luis. WLANs and WPANs towards 4G Wireless. Artech House: Boston. 2003.

¤ Proceedings of the IEEE Conference on Wireless LAN Implementation. IEEE Computer Society Press: California. Sept. 1992.

This book contains some of the history of wireless networks, as well as the beginnings of the 802.11 standards.

¤ Rawat, K.S. and Massiha, G.H. "Secure data transmission over wireless networks: issues and challenges." IEEE Region 5, 2003 Annual Technical Conference. 11 April 2003. pp. 65-68.

This paper contains some technical information regarding how WEP does its encryption and how it tries to authenticate devices. It also outlines some of the most common attacks against wireless networks.

¤ Stallings, William. Wireless Communications and Networks. Prentice Hall: New Jersey. 2002.

This book contains information regarding wireless local area networks, including the technology used to implement them and the various techniques that are frequently used. There is some discussion of the structures of the protocols and standards, although it is not too in-depth.

¤ Williams, Joseph. "The IEEE 802.11b security problem." IT Professional. Vol. 3, Issue 6, Nov.-Dec. 2001. pp. 91-96.

This article discusses the built-in security measures in 802.11b and many of the technical aspects of their weaknesses and how they can be compromised. It provides a specific example of how WEP is vulnerable to attack.

Top of page