+ All Categories
Home > Education > Complexity Versus Comprehendability: Simplifying Wireless Security

Complexity Versus Comprehendability: Simplifying Wireless Security

Date post: 11-Nov-2014
Category:
Upload: olivia-moran
View: 828 times
Download: 3 times
Share this document with a friend
Description:
This paper will follow the use of unsecured wireless networks in the city of Derry. Derry established a city wide open access network in 2008, thereby providing ideal conditions for the study of security issues pertaining to unsecured open access networks. The paper will attempt to uncover the reasoning behind the failure of individuals to take suitable security measures in light of threats that exist.
Popular Tags:
13

Click here to load reader

Transcript
Page 1: Complexity Versus Comprehendability: Simplifying Wireless Security

RESEARCH PAPER BY OLIVIA MORAN

www.oliviamoran.me

Complexity Versus Comprehendability:

Simplifying Wireless Security

Page 2: Complexity Versus Comprehendability: Simplifying Wireless Security

Olivia Moran is a leading training specialist who specialises in E-Learning instructional design and is a certified Moodle expert. She has been working as a trainer and course developer for 3 years developing and delivery training courses for traditional classroom, blended learning and E-learning.

Courses Olivia Moran Has Delivered: ● MOS ● ECDL ● Internet Marketing ● Social Media ● Google [Getting Irish Businesses Online] ● Web Design [FETAC Level 5] ● Adobe Dreamweaver ● Adobe Flash ● Moodle Specialties:

★Moodle [MCCC Moodle Certified Expert]

★ E Learning Tools/ Technologies [Commercial & Opensource]

★ Microsoft Office Specialist

★ Web Design & Online Content Writer

★ Adobe Dreamweaver, Flash & Photoshop

About The Author Olivia Moran

www.oliviamoran.me

Page 3: Complexity Versus Comprehendability: Simplifying Wireless Security

_________________________________________________________________________________________________ Page: 3

© 2007 Olivia Moran [www.oliviamoran.me] Complexity Versus Comprehendability: Symplifying Wireless Security

Abstract

Security for wireless networks is a widely publicised topic with thousands of articles and papers to be found on the Web. When it comes to practical advice on how to secure your home network, and stay safe when using public open access networks, the available literature is inadequate. The vast majority of this literature is presented in an inappropriate manner resulting in the bemusement of the average user making it inaccessible to them. It is unnecessarily complicated through the use of technical jargon and unambiguous instructions. Consequently, while people are aware of the basic concerns it is difficult for them to learn the practical skills needed to put even the most basic security safeguards in place. This paper will follow the use of unsecured wireless networks in the city of Derry. Derry recently established a city wide open access network, thereby providing ideal conditions for the study of security issues pertaining to unsecured open access networks. The paper will attempt to uncover the reasoning behind the failure of individuals to take suitable security measures in light of threats that exist. Based on this insight, a user-friendly prototype multimedia application is developed. The prototype aims to provide users with the practical skills they need to secure their data in a simple and easy to understand manner. An evaluation will be carried out and the contributions of this research will be acknowledged. In conclusion areas for future research and development in this field of study will be suggested.

1. Introduction

With the advent of teleworking, Internet shopping and social networking more people are now opting to log online as users. Users are no longer confined to the physical location of their desktop P.C. The new „generation on the move‟ reflects the paradigmatic shift in technologies fuelled by the increasing use of mobile computing. Reduced cost and size of memory and pervasive devices, as well as faster and more powerful processors, have made the growth and acceleration of pervasive computing possible. The vision of pervasive computing implies obtaining information the moment it is needed regardless of geographical location. Realisation of this vision would, “Give users the freedom not only to communicate efficiently at any place in the world but also to access local information as well as information residing on the Internet at any place and any time” [Burkhardt et al, 2002]. This opportunity is now open to everyone with evidence of entire cities and their citizens embracing the idea. A prime example of such a city is Derry, the second largest city in Northern Ireland.

www.oliviamoran.me

Page 4: Complexity Versus Comprehendability: Simplifying Wireless Security

_________________________________________________________________________________________________ Page: 4

© 2007 Olivia Moran [www.oliviamoran.me] Complexity Versus Comprehendability: Symplifying Wireless Security

This city has taken a foresight approach to emerging changes in todays‟ technological environment. In 2005, Derry established the „Wireless City Project‟. This project involved three main players including Derry City Council, the University of Ulster and North West Institute of Further and Higher Education. As part of this project Derry experienced the launch of citywide Internet access making it one of the first cities in Europe to offer such a service. Derry was quickly transformed from a historical walled city to a wireless one. A variety of technologies were utilized to create this wireless city, namely Wireless Mesh Network (W.M.N.) technologies. These W.M.N.‟s “Present a promising solution by extending network coverage based on a mixture of wireless technologies” [Waharte & Boutaba, 2005]. The W.M.N. was chosen, as it is the most appropriate technology currently available for building a citywide network. The provision of such a service in Derry undoubtedly offers many benefits for those who avail of it. However, users need to be aware that this network is an open access network free for everyone to use. Using an unsecured network can raise serious security concerns with many negative implications for the user should they not take appropriate security precautions. This paper will examine the main security issues attached to using unsecured networks. Firstly, the paper will consider the reasoning behind the failure of many individuals to protect themselves and their personal data when using unsecured wireless networks. Having identified these core reasons, attempts will be made to counteract them through the construction of a simple user-friendly prototype multimedia application. This prototype will attempt to significantly reduce the complex nature of many security help guides and instruction manuals currently available. An evaluation will be conducted and the contributions of this research will be acknowledged. In conclusion suggestions for future research and development for advancement in this subject area will be presented.

2. Background Literature [Cheng et al, 2006] describe WMN as “An emerging technology for future broadband wireless access”. They consist of wireless access networks that are according to [Waharte et al, 2006], interconnected by a wireless backbone. They operate on the concept of mesh routers and mesh clients where “Each node operates not only as a host but also as a router, forwarding packets on behalf of other nodes that may not be within direct wireless transmission range of their destinations” [Akyildiz et al, 2004]. [Waharte et al, 2006] suggest that their development has been fuelled by increased user expectations in relation to anytime and anywhere connectivity, as well as quality of service guarantees. W.M.N.‟s are a revolutionary technology facilitating citywide Internet access. Their use brings many benefits to both business and the everyday citizens, however for those who fail to take appropriate precautions there can be numerous drawbacks. “Data security and privacy is the major concern in the current generation of „Wireless Web‟ offerings” [Borsc & Shinde, 2005]. Using an unsecured network is not without risks, these networks are completely open “Leaving Britain‟s 29m Internet users exposed to fraud, identity theft or worse” [Clapperton, 2007]. When security precautions are not undertaken the end result for users can be very frightening, yet individuals continue to ignore the warnings.

2.1 Getting The Configurations Right A survey carried out by LAN Communications in 2004 identified instances where business access points were not correctly configured with default settings still in use [LAN Communications, 2004]. One of the conclusions drawn from the results of this survey is that even where access points are deployed in an organised and controlled manner, this is of little benefit. IT staff are not always properly educated and equipped with the expertise needed to configure wireless devices appropriately. This is a worrying indication that even those who are responsible for setting up networks for businesses are finding configuration of the necessary devices difficult to grasp.

Page 5: Complexity Versus Comprehendability: Simplifying Wireless Security

_________________________________________________________________________________________________ Page: 5

© 2007 Olivia Moran [www.oliviamoran.me] Complexity Versus Comprehendability: Symplifying Wireless Security

One can imagine how even more difficult is must be for individuals setting up such networks at home who are unfamiliar with network technologies and their correct configurations. It has been estimated that “90% of WLan security incidents until 2010 will be the result of misconfigured Systems” [Eastwood, 2007]. The first task that should be completed when setting up a router or access point is to change default settings established by the manufacturer. While some measures have been taken by manufacturers to reduce the complexity of the configuration process many users are still bemused by it and simply do not bother enabling the security features as they find it too difficult.

2.2 Following Best Practice LAN Communications highlight a number of attacks including eavesdropping, denial of service, unauthorised access and data tampering that have resulted from a failure to follow basic guidelines pertaining to network security [LAN Communications, 2004]. This failure is extremely problematic especially where sensitive data is being transmitted. A malicious hacker can „snoop‟ and „sniff‟ the air for data packets, a point noted by [Eastwood, 2007] “A wireless network requires packets of data to travel through the air, making them prone to inception”. TJX is a company in America who invested 17.4 billion dollars in their wireless network but still failed to apply basic security measures to their corporate wireless network. This network was found by [Pereira, 2007] to have had less security than one would expect to find on an average home network resulting in the theft of over 45.7 million credit and debit card numbers. Surprisingly the company failed to install firewalls and data encryption on many of the computers using their network. The losses from this attack for both the retailer and the individuals who suffered are estimated to be in the millions. This attack is evidence that major corporations with massive budgets are not aware of the threats facing their networks, and suggests they do not employ the necessary expertise needed to protect against such dangers.

2.3 Complexity of Security Solutions Users find it difficult to keep abreast of the “Ever-shifting landscape of new threats, coupled with enhanced security features bemuses” [Cracknell, 2007]. Available products are often extremely difficult for the average user to configure and get to grips with. This sad reality is highlighted by [Aronauer, 2007] “Ironically, Wi-Fi networks have always offered safety features to block people from piggybacking on private networks. Unfortunately, the set-ups are too complicated and time-consuming for many users” resulting in only three out of every five enabling safety features. Complexity and difficulty of use are some of the main reasons why so many people do not secure their networks. They also see it as an inconvenience and simply do not understand the need for security. The concept of „plug and play‟ has pervaded every part of our lives, as people have grown accustomed to having an out of the box solution. While these devices are easy to install [Furnell & Ghita, 2006], note that these solutions can create a number of serious security issues. Plug and play users do not have to bother themselves with examining configuration settings, overriding their first opportunity to deal with the issue of security altogether. It has been highlighted that the manufacturers of these devices are failing to provide an adequate amount of guidance for customers who wish to make their networks secure. According to [Furnell & Ghita, 2006] when it comes to help manuals and instructions provided by manufacturers for setting up security on their devices, “Help provided for each setting is minimal, detailing only on the syntax and format information rather than explaining the role and function of each option”. While all information provided was technically correct it was difficult to understand. This had major negative consequences for the user when attempting to configure the device correctly and often lead to the user making the wrong choice. It was discovered that manufacturers “All seem to excel in providing the required functionality and protocols, the implementation is hindered by the level of information to guide the configuration process” [Furnell & Ghita, 2006].

Page 6: Complexity Versus Comprehendability: Simplifying Wireless Security

_________________________________________________________________________________________________ Page: 6

© 2007 Olivia Moran [www.oliviamoran.me] Complexity Versus Comprehendability: Symplifying Wireless Security

It is clear that manufacturers experience a weak spot when it comes to „correctness versus comprehensibility‟ and are finding it difficult to strike a balance. It was concluded that usability factors act as a major barrier to the deployment of wireless networks that are security enabled and hence there is a pressing need for “Clearer presentation of security options at the software level and it would be desirable for more products to provide support that effectively differentiates between experienced and novice users” [Furnell & Ghita, 2006].

3. Proposed Solution The author proposes a simple user-friendly prototype multimedia application. This prototype illustrates how help guides and instructions can be constructed without the burden of unnecessary levels of complexity. It is targeted at the citizens of Derry City, with the aim of making them aware of the need for security when utilising unsecured networks both in the city and at home. This is achieved through the use of lessons resembling tutorials that allow users to implement and apply security solutions currently available to them. It not only empowers people to take action by providing practical advice that is quick and easy to implement, but also to accept responsibility for securing their personal data when using wireless networks. Ideally this application will be distributed on Compact Disk Read Only Memory (C.D.-R.O.M.‟s) free of charge, thus ensuring its availability.

3.1 Application Design The „Derry City Wireless‟ application is divided into two main sections „home‟ and „Derry city‟. The „home‟ section deals with issues pertaining to wireless security at home while „Derry city‟ concerns the problems that can arise from the use of public open access wireless networks. The content of each section is presented in tutorial fashion with practical advice given so that users can learn how to implement security on their networks and mobile devices. A number of technologies were utilised during the production of the prototype. These were chosen as they were found to satisfy the specifications and requirements of the application while doing so in a relatively cost effective way. They also ensured a shorter lead-time for the prototype. These included the „Flash‟ development environment, „Cam Studio‟ and „Sitepal‟ avatars.

3.1.1 Technologies Utilised The prototype was developed in „Macromedia Flash‟, an application development environment that has become increasing popular in recent years. The majority of Internet users are familiar with „Flash‟ applications with most computers possessing the capability to play „Flash‟ files. According to [Karvir, 2005] the Flash Player is the most widely deployed client runtime in the world boasting penetration of 98% among Internet enabled Personal Computers (P.C.‟s). „Flash‟ permits the production of projector files, a stand-alone executable program perfect for deployment on C.D.-R.O.M.‟s. The success of the prototype is dependent upon users listening and following instructions carefully. „Flash‟ caters for the engagement of the target audience through rich interactive content that is delivered in a simple yet visually appealing form, reducing the complexity of the information being presented. Prior to the commencement of the development of the prototype in „Flash‟ storyboarding was conducted in order to organise the content of the presentation explicitly illustrating how the content would be displayed and in what sequence. A number of animations are used throughout the application. These provide visual reinforcements for the learner helping them to comprehend the concept as described by the avatar during the lessons and contribute to the professional feel of the application.

Page 7: Complexity Versus Comprehendability: Simplifying Wireless Security

_________________________________________________________________________________________________ Page: 7

© 2007 Olivia Moran [www.oliviamoran.me] Complexity Versus Comprehendability: Symplifying Wireless Security

The avatar technology offered by „Sitepal‟ was used to create the personalised talking and animated character called „Olivia‟. This virtual speaking character was key to entertaining the user as well as being informative. „Olivia‟ (as presented in figure 1) acted as a guide directing users through the steps involved in the completion of different tasks i.e. configuring your router, encryption etc. Users identify with „Olivia‟, a young woman dressed in casual clothes. This supports the message of keeping things simple and easygoing, allowing the user to learn in a relatively relaxed manner. The avatars‟ voice is clear and consistent throughout the application generated through the use of text to speech technology (T.T.S.). This audio element results in a better learning process for the user who is able to retain more information than they would have, if the message were communicated using text. Testing indicated that the avatar plays a major role in focusing the users‟ attention on the more critical points in the presentation. When questioned about their favourite aspect of the application the sample users agreed unanimously that the speaking virtual character was the most impressive and enjoyable element in the prototype.

Figure 1: Virtual Avatar „Olivia‟

„Cam Studio‟ is a freeware solution that facilitates the capture of screen motion and audio. This application allowed for the inclusion of real time screen views permitting the users to visually follow the steps as described by the avatar, leaving little room for confusion.

3.1.2 Competitor Analysis An in-depth examination of competitor material was conducted. This involved analysing various solutions that already exist, that aim to educate users on the critical issues pertaining to wireless security. This analysis revealed that much of the information available is presented in such a way that it renders it useless to the average users. While the relevant concepts are explored, they are discussed in technical terms that the average users are unable to comprehend. The modality of text is relied on too heavily resulting in ambiguity of the information being presented and data overload for the user. The framing of information impacts greatly on the conclusions, implications and assumptions that the user draws about the task at hand. For example, where information about wireless security is presented in an unclear and unambiguous manner the user may perceive the issue as more complex than it actually is, deterring the user from learning more about it. To overcome this limitation an avatar was introduced communicating with the user through voice and gesture. The multimodal interface helped reduce unnecessary complexity and deliver the message to the user in a clear and concise way (figure 2).

Page 8: Complexity Versus Comprehendability: Simplifying Wireless Security

_________________________________________________________________________________________________ Page: 8

© 2007 Olivia Moran [www.oliviamoran.me] Complexity Versus Comprehendability: Symplifying Wireless Security

Figure 2: Multimodal interface

During the competitor analysis similarities in terms of the colours used became apparent with colours such as reds, yellows, blacks and greys widely utilised. They colours invoke a certain senses and emotions in users. The colour red, black and grey creates a sense of „danger‟ while yellow can be associated with „caution‟ and „warning‟ signage. The overall appearance of the prototype is one that supports the message being presented and one that aims to create an enjoyable user experience and avoid these feelings of danger etc. The prototype uses various shades of purple throughout. These look both simple and clean while portraying a sense of calm. The layout, fonts, colours, images used in the prototype are subtle avoiding any unnecessary distractions for the user.

3.1.3 System Architecture The System Architecture of the prototype (figure 3) consists of three main modules including tooling, programming models and client.

Figure 3: System Architecture

The tooling module consists of the Flash authoring tool. This component was concerned with the deployment of the applications‟ multimedia aspects namely video, graphics and sound. The programming modules including actionscript and class libraries allowed for the rapid development of the prototype. A relatively small amount of programming knowledge was required with development time being reduced through the use of pre-built reusable components including controls available through the class libraries. The client module catered for the seamless and consistent presentation of information across various hardware and software platforms, operating systems and Internet browsers. This is key to ensuring a rich user experience. The Flash player is a virtual machine used to run Flash files on the clients‟ computer.

Page 9: Complexity Versus Comprehendability: Simplifying Wireless Security

_________________________________________________________________________________________________ Page: 9

© 2007 Olivia Moran [www.oliviamoran.me] Complexity Versus Comprehendability: Symplifying Wireless Security

3.2 Implementation This phase of development encompassed the building, testing and deployment of the prototype. Production specifications acted as a guide for the production process. The prototype underwent extensive testing and documentation was created. 3.2.1 Testing Testing was conducted to identify and remove errors and inconsistencies before development of the final prototype. According to [Bennett et al, 2006] testing at this stage helps to keep further maintenance and development time and costs to a minimum. Bugs and problems encountered in the early stages of the applications‟ development are easier to rectify and cheaper to correct than if they were discovered in the final stages of development. The tests were also successful in uncovering areas for potential future development. The testing stage was broken down into three main phases. Phase one of prototype testing involved the cooperation of a focus group in an effort to identify underlying issues that the author was not conscious of. The focus group was formed from a small group of sample users, mainly friends and family of the author. During this time a number of issues were highlighted and discussed. The sample immensely enjoyed the avatar having had very little experience with this sort of technology in the past. They also generated positive feedback pertaining to the content stating that it was both interesting and informative. As part of prototype testing phase two, user acceptance testing was carried out at different intervals during the development of the prototype. Users were required to familiarise themselves with the prototype application and its‟ content prior to the completion of „user acceptance testing surveys‟. The results obtained from this phase facilitated the iterative development of the prototype, with the application being improved through the generation of feedback and the clarification of requirements. A number of additions were suggested during this phase of testing. Recommendations, illustrated in table 1, will be included in the final application.

Function Description

Test Function

A test function will allow for the evaluation of the user and the level of learning that occurred. At the end of each lesson the users will be subjected to a formative assessment in the form of a multiple-choice quiz. This will consist of 10 questions covering the basics of the lesson. This test function will provide users with an opportunity to utilise the concepts, skills and attitudes that they have learned during the lesson.

Rewind Function

A rewind function will be included allowing users to rewind the lesson if they miss a part or wish to hear it again to clarify certain points.

Table 1: User Recommendations The third phase of prototype testing took the form of test logs with „test transcripts‟ being drawn up specifying the test cases that took place as well as expected and actual results. This was necessary to ensure that all errors and inconsistencies throughout the application had been rectified before the final prototype was completed.

Page 10: Complexity Versus Comprehendability: Simplifying Wireless Security

_________________________________________________________________________________________________ Page: 10

© 2007 Olivia Moran [www.oliviamoran.me] Complexity Versus Comprehendability: Symplifying Wireless Security

4. Future Direction & Research

4.1 Generic Structure The applications structure is generic and could easily be extended for use on a variety of platforms such as the Web and Digital Video Disk (D.V.D.) for use in home D.V.D. players. The application is deployed on the „Flash Player‟ not the web browser. Consequently, the application will have the same appearance regardless of the platform and browser it is deployed on. It also has the potential to be developed for other application scenarios. Due to the increased use of mobile devices such as smartphones and Personal Digital Assistants (P.D.A.‟s) with very unique security needs, it may be feasible to consider the development of a version of the application aimed specifically at securing these technologies.

4.2 Standards of Simplicity A new standard was recently launched by the „Wi-Fi Alliance‟ called „Wi-Fi Protected Setup‟ (W.P.S.). This new standard is the most recent attempt at simplifying the installation of security features on various wireless solutions. It remains to be seen whether this will lead to a substantial increase in the amount of home users who will activate the security features in the wireless solutions released in June, with this new specification. These devices will bear a special logo and according to [Aronauer, 2007] will be twice as easy to install, cutting the number of steps it takes to activate the security features in half. Research into the success of this new standard and how it impacts on consumer behaviour will need to be carried out in the months ahead. It will remain to be seen whether or not it will have a positive effect on the average home user and improve security. If successful, moves should be taken to change this W.P.S. optional standard into a mandatory one resulting in users being able to set up and use their wireless network in both an easy and secure manner.

4.3 Training Help Guide and User Manual Authors It is usually the developers and programmers who build the various security solutions that are responsible for writing the accompanying help guides and user manuals. These individuals are experts in their field of study and are constantly immersed in the technical jargon, concepts and ideals pertaining to wireless network security. All of these become commonplace in the language that they use to communicate with work colleagues. This does not pose a problem as such work colleagues are well versed in the area of network security. Furthermore they do not question technical terms etc. used and they require little or no explanation of their semantics. Consequently, the jargon associated with a particular product, can unconsciously seep into the user guide or manual being produced. One could easily assume from the examination of help guides produced by major players such as Microsoft, Belkin, etc. that little or no quality control is practiced. Greater importance should be placed on producing usable, useful and comprehendible instructions for users of different education and ability levels. Tighter quality controls need to be developed in terms of „ease of use‟ and the creation of clear and concise instructions that can be understood without significant effort. Where possible and appropriate, user testing should be carried out so that feedback can be generated and the guides improved before final approval. Developers and programmers if charged with the creation of guides and manuals should be given adequate training and instruction on how to produce them in such a way, that they are user friendly, simple and helpful.

Page 11: Complexity Versus Comprehendability: Simplifying Wireless Security

_________________________________________________________________________________________________ Page: 11

© 2007 Olivia Moran [www.oliviamoran.me] Complexity Versus Comprehendability: Symplifying Wireless Security

5. Conclusion This paper examined the main security issues pertaining to the use of unsecured wireless networks. It considered the reasons why individuals, while aware to a certain extent of the dangers, do little to safeguard themselves against attack. Based on this insight, a user friendly prototype multimedia application was developed and its‟ main elements were discussed in depth. The main contributions of this research were briefly addressed and suggestions for future study and development were made. It is unlikely that people are oblivious to the need for wireless security as it is difficult to miss the countless newspaper reports concerning the extent of cyber attacks and identity theft on unsuspecting members of the public. In light of these attacks it is clear that people are not taking proper precautionary measures when using unsecured wireless networks. Evidence suggests that available wireless security solutions including help guides and instructions are too complex and do not meet the needs of their users. The culture of „plug and play‟ solutions that is pervading through our everyday lives is further aggravating the problem. The „Derry City Wireless‟ multimedia prototype has set the foundation for a feasible application that is informative, interesting and above all user friendly. This application has the potential to be developed with ease in a relatively short space of time and in a cost effective manner. Upon evaluation of the prototype, it was found that users responded more favourably to examples they could personally relate to. It helped users to translate global security issues into personal ones. This allowed them to comprehend how these issues could impact them on a personal level. The research conducted by the author was and remains to be an area deserving urgent attention. This paper has created an awareness of the pressing need to make wireless security accessible to everyone. This can be achieved in part by having clearer and more concise methods for teaching people about the topic. The prototype demonstrated the extent to which information could be presented to a novice user at a simplified level without compromising the critical points being communicated. This paper has been successful in providing a summary of the motivations for the development of applications similar in nature and purpose to that of the prototype and highlighting opportunities for further study in this research area.

Page 12: Complexity Versus Comprehendability: Simplifying Wireless Security

_________________________________________________________________________________________________ Page: 12

© 2007 Olivia Moran [www.oliviamoran.me] Complexity Versus Comprehendability: Symplifying Wireless Security

6. Refrences [AKYILDIZ ET AL, 2004] AKYILDIZ, I. F. & WANG, X. & WANG, W. (2004) “Wireless Mesh Networks: A Survey” Computer Networks 47, pp. 445-487. Holland: Elsevier. [ARONAUER, 2007] ARONAUER, R. (2007) “Safety With No Strings Attached – New Initiatives Make Secure Wi-Fi Access Easier Than Ever” Sales and Marketing Management, 159(2), pp. 16. North Carolina: ABI/Inform Global. [BENNETT ET AL, 2006] BENNETT, S. & McROBB, S. & FARMER, R. (2006) “Object-Oriented Systems Analysis and Design Using UML” 3

rd ed. Berkshire: Mc Graw Hill Education.

[BORSC & shinde, 2005] Borsc, m. & Shinde, h. (2005) “Wireless Security And Privacy” IEEE International Conference on Personal Wireless Communications, 23-25 Jan, New Delhi: IEEE NJ, USA. [BURKHARDT ET AL, 2002] BURKHARDT, J. & HENN, H. & HEPPER, S. & RINTDORFF, K. & SCHACK, T. (2002) “Pervasive Computing – Technology and Architecture of Mobile Internet Applications” Edinburgh: Pearson Education Limited. [Cheng et al, 2006] Cheng, H. T. & Jiang, H. & Zhuang, W. (2006) “Distributed Medium Access Control for Wireless Mesh Networks”, Wireless Communications and Mobile Computing 6(6) - Special Issue: Medium Access Control Protocols for Wireless Ad Hoc Networks. Issue Edited by Shen, X. S. & Kobayashi, H. & You, X. & Pan, J. pp. 845-864, New Jersey: John Wiley & Sons. [Clapperton, 2007] Clapperton, G. (2007, April 1) “Thank you Superhacker, you saved my computer” The Sunday Times. London: Times Newspapers Ltd. [CRACKNELL, 2007] CRACKNELL, P. (2007) “New Attacks Demand New Defences” Computer Weekly Vol pp.36. : UK: Reed Business Information UK Ltd. [EASTWOOD, 2007] EASTWOOD, G. (2007) “Meet the Challenge of WLAN Security” Computer Weekly 5/29/2007, pp.32-34. U.K: Reed Business Information Limited. [Furnell & Ghita, 2006] Furnell, s. & Ghita, b. (2006) “Usability Pitfalls in Wireless LAN Security” Network Security 2006(3), pp. 4-8. London: Elsevier Ltd. [KARVIR, 2005] KARVIR, V. (2005) “Whitepaper - Delivering Enterprise Applications, Content, and Communications with the Flash® Platform” [online], retrieved 1 August 2007, from http://www.adobe.com/platform/whitepapers/architecture_tier.pdf. San Francisco: Macromedia Inc. [LANS COMMUNICATIONS, 2004] LANS COMMUNICATIONS (2004) “LAN Survey Reveals Serious Network Security Issues” [online], retrieved 6 July 2007, from http://www.lancomms.ie/news.php?action=view&id=56. Dublin: LAN Communications. [Pereira, 2007] Pereira, J. (2007) “Breaking The Code: How Credit-Card Data Went Out Wireless Door: In Biggest Known Theft, Retailer‟s Weak Security Lost Millions of Numbers” Wall Street Journal (Eastern Edition) May 4, pp. 1. New York: Louis Gordon Crovitz. [WAHARTE & Boutaba, 2005] WAHARTE, S. & Boutaba, R. (2005) “Tree-Based Wireless Mesh Network – Architecture: Topology Analysis” in Proceedings of the First International Workshop on Wireless Mesh Networks (MeshNets), Budapest, Hungary, July 2005.

Page 13: Complexity Versus Comprehendability: Simplifying Wireless Security

_________________________________________________________________________________________________ Page: 13

© 2007 Olivia Moran [www.oliviamoran.me] Complexity Versus Comprehendability: Symplifying Wireless Security

[WAHARTE ET AL, 2006] WAHARTE, S. & BOUTABA, R. & IRAQI, Y. & ISHIBASHI, B. (2006) “Routing Protocols in Wireless Mesh Networks: Challenges and Design Considerations” Multimedia Tools and Applications 29(3), pp. 285-303. Netherlands: Springer.


Recommended