Defence In Depth: Preventing Going Hairless Over Wireless
Wireless networks are fast establishing themselves as a part of the information technology infrastructure. The security mechanisms have yet to provide adequate protection to the data passed by wireless systems and to the 'wired' systems to which they connect. Whilst encryption authentication and authorization are necessary elements in the security equation there are other techniques that can be used in defense. This paper discusses some techniques that utilize modifying radio wave behavior (directional antenna and low power transmissions) as a means to add depth to security. The paper also presents some options such as file compression and burst transmissions as considerations for reducing the probability of intercept.
169 (PDF, 1.87MB)
17 Apr 2002