{"title":"为用户提供无线网络安全保障","authors":"Steve F. Russell","doi":"10.1109/ITCC.2001.918786","DOIUrl":null,"url":null,"abstract":"Network security technology generally concentrates on protection of the network infrastructure and, by implication, protection of the user. While this is true for the larger public network, the local network environment of the user is very vulnerable to denial-of-service, \"man-in-the-middle\" and other attacks that can be devastating. In this paper, we examine the issues of wireless security from the perspective of the user and the local network. We look at airlink attacks by specialized transmitters and intercept receivers. Examples are taken from the technologies used in IS-95 CDMA cellular radiotelephones and IEEE 892.11 wireless LANs.","PeriodicalId":318295,"journal":{"name":"Proceedings International Conference on Information Technology: Coding and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Wireless network security for users\",\"authors\":\"Steve F. Russell\",\"doi\":\"10.1109/ITCC.2001.918786\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network security technology generally concentrates on protection of the network infrastructure and, by implication, protection of the user. While this is true for the larger public network, the local network environment of the user is very vulnerable to denial-of-service, \\\"man-in-the-middle\\\" and other attacks that can be devastating. In this paper, we examine the issues of wireless security from the perspective of the user and the local network. We look at airlink attacks by specialized transmitters and intercept receivers. Examples are taken from the technologies used in IS-95 CDMA cellular radiotelephones and IEEE 892.11 wireless LANs.\",\"PeriodicalId\":318295,\"journal\":{\"name\":\"Proceedings International Conference on Information Technology: Coding and Computing\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-04-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings International Conference on Information Technology: Coding and Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITCC.2001.918786\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings International Conference on Information Technology: Coding and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITCC.2001.918786","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network security technology generally concentrates on protection of the network infrastructure and, by implication, protection of the user. While this is true for the larger public network, the local network environment of the user is very vulnerable to denial-of-service, "man-in-the-middle" and other attacks that can be devastating. In this paper, we examine the issues of wireless security from the perspective of the user and the local network. We look at airlink attacks by specialized transmitters and intercept receivers. Examples are taken from the technologies used in IS-95 CDMA cellular radiotelephones and IEEE 892.11 wireless LANs.