SEARCH

Books

Updated: May 15, 2011 13:25 IST

Security threats to wireless networks

D. Murali
Comment   ·   print   ·   T  T  
Title: Mobile Computing, Theory and Practice. Author: Kumkum Gareg. Photo: Special Arrangement
The Hindu
Title: Mobile Computing, Theory and Practice. Author: Kumkum Gareg. Photo: Special Arrangement

First in the list of ‘security threats to wireless networks,’ as Kumkum Garg documents in ‘Mobile Computing: Theory and practice’ (www.pearsoned.co.in), is ‘accidental attack’ owing to frequent failure of devices and components. Next is passive attack, where the goal of the intruder is only to monitor or get information that is being transmitted. “Attacks may include releasing message content or traffic characteristics. Since no data are altered, passive attacks are difficult to detect,” the author explains.

In contrast, ‘active attack,’ involves modification of data or false data transmission, as in man-in-the-middle attack. Denial of service (DoS) is possible where there is either temporary prevention of communication facilities or disruption of the entire network, Garg cautions. “This is done by flooding it with a large number of messages to degrade the performance of the system.”

Other threats listed in the book include unauthorised usage (which can be prevented through proper user authentication techniques); heterogeneity (because mobile nodes need to adjust to potentially different physical communication protocols as they move to different locations); and resource depletion/ exhaustion (for example, techniques such as public key cryptography cannot be used during normal operations due to limited processing power and battery life).

War driving/ walking, featured last in the list, may remind some of the popular war game of the 1980s called war-dialling, a technique for searching phone numbers with modems attached to them. Observes Garg that, as wireless LANs gain popularity, hackers can find them by just taking a notebook computer or pocket PC fitted with a wireless card and some detection software such as netstumbler, kismet, and airsnort. Or, just a smartphone.

Guidance for beginners.

**

Tailpiece

“Our carbon footprint software creates such personalised visualisation that when the boss comes into the office…”

“The whole floor gets darkened?”

“Yes, and the walls and ceilings, too!”

**

BookPeek.blogspot.com

More In: Books | Gadgets | Technology
This article is closed for comments.
Please Email the Editor

Last Sunday, a friend left a message for me on Facebook. “Professor Mushirul Hasan was injured in a road accident. He is critical.” I said a quick prayer for his life and health. As news came in, f... »

More »
Instagram

O
P
E
N

close

Recent Article in Books

Rajmohan Gandhi

Response to Arundhati Roy's annotated edition in pipeline: Rajmohan Gandhi

Writer and historian Rajmohan Gandhi says the extensively annotated edition of B.R. Ambedkar’s Annihilation of Caste, introduced... »