Testing Wireless Security

October 2004
Business Communications Review;Oct2004, Vol. 34 Issue 10, p28
Trade Publication
This article discusses the wireless-security test. The security test bed consisted of a core network, a Site-A network and Site-B network, each a different subnet, interconnected via an Extreme Summit 48L2/L3 switch/router. The core network included Windows 2003-based Domain Controller, DNS server and DHCP server. For IEEE 802.1x authentication of wireless clients, which all the tested products supported, researchers used Funk Software's Steel Belted Radius server, ver. 4.71, running on a Windows 2000 (SP4) Compaq Deskpro. Researchers used Ixia's IxChariot ver. 5.0 traffic-generation package to test throughput. In every case, the traffic that was passed between wireless laptops and a server on the wired core network consisted of 40 percent VOIP stream and 60 % TCP connections and streams, by traffic volume.


Related Articles

  • VoIP routers. Taylor, Nathan // Australian PC User;Sep2006, Vol. 18 Issue 9, p68 

    The article focuses the use of Voice over Internet Protocol (VoIP) routers for computer network security. Poor installation of routers expose the users and other users on the local network to harmful viruses and hacker attacks. Ease of configuration is one factor to look for in a VoIP router....

  • Ramping up VOIP security. Musich, Paula // eWeek;3/24/2008, Vol. 25 Issue 10, p26 

    The article reports on the rules established by the Extreme Networks Inc. for its Sentriant security appliances to protect against threats to data networks such as denial-of-service attacks (DoS). It cites that the company's effort aims to negate its voice-over-Internet protocol (VOIP)...


    The article informs that computer security has been one of the few growing areas of the networking market over the last two years because of a combination of factors, including technology innovation, world events, increased government spending, increased paranoia, and increased real threats....

  • A little knowledge is a dangerous thing as end-users add mobile devices to the system. Lawson, Alan // Computer Weekly;9/20/2005, p26 

    Informs that encryption could address threat to data security of consumer storage products. View that information is an essential component of every daily business activity; Importance of access to fellow employees in a collaborative framework; Discussion on the cost of deploying enterprise...

  • App assesses risk of changes beforehand. Musich, Paula // eWeek;10/24/2005, Vol. 22 Issue 42, p16 

    The article presents information on the launch of Skybox Assure offering of security risk assessment vendor Skybox Security Inc. It hopes to convince network engineers that it can take much of the guesswork out of this process by applying its technology to the change management process before...

  • Black Key Remote Distribution Saves lives. Wilkins, Brian A. // Army Communicator;Summer2009, Vol. 34 Issue 2, p28 

    The article focuses on the remote Communications Security (COMSEC) Distribution Program that was rolled out successfully by the 146th Expeditionary Signal Battalion (ESB) of the U.S. Army. It says that the 146th ESB is leading the way with the Black Key Remote COMSEC Distribution Program, which...

  • VoIP security threats: Fact or fiction? Garretson, Cara // Network World;7/25/2005, Vol. 22 Issue 29, p14 

    The article focuses on increasing voice over Internet protocol (VoIP) security threats by intruders. In June 2005, a company called Internet Security Systems Inc. (ISS) issued an alert to warn users that Cisco Systems Inc.'s VoIP offering had a security flaw that would allow just that. According...

  • HP challenges Cisco routers. Musich, Paula // eWeek;2/28/2005, Vol. 22 Issue 9, p27 

    The article reports that although Cisco Systems Inc. may not be quaking in its boots, Hewlett- Packard Co. (HP) has challenged some of Cisco's weaknesses with the first of several routers it is planning to add to its ProCurve Networking family. Brice Clark, global director of strategic planning...

  • Adaptive Identity-Based Signcryption for Dynamic Source Routing in Machine to Machine Networks. Ami Damian; Wooyoung Soh; Seoksoo Kim // Journal of Security Engineering;Jun2013, Vol. 10 Issue 3, p305 

    Machine-to-machine (M2M) communication brings numerous challenges in security which traditional communication models have not yet addressed. Particularly, due to their inherent unguarded, low-cost, and mass-deployed nature, M2M devices would invite new threats in security with the collaboration...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics