Show simple item record

dc.contributor.authorHurley, Matthew Tremainen_NZ
dc.date.available2011-04-07T03:10:13Z
dc.date.copyright2004-11-12en_NZ
dc.identifier.citationHurley, M. T. (2004, November 12). Wireless communications: An analysis of wireless standards in the telecommunications business sector of New Zealand (Dissertation, Bachelor of Science with Honours). Retrieved from http://hdl.handle.net/10523/1212en
dc.identifier.urihttp://hdl.handle.net/10523/1212
dc.description.abstractWireless networking is making rapid inroads as a viable alternative to traditional wired networks for businesses where convenience and mobility is important for day to day operations. However, the improved convenience brings with it concerns for the confidentiality of information. This is because wireless network transmissions are easily accessible to outsiders. There is therefore a need for security mechanisms to stop intruders from accessing confidential business information. Currently there are wireless standards such as 802.11(a, b, and g), Bluetooth, Code Division Multiple Access (CDMA), and General System for Mobile Communications (GSM), which have built in security features to secure wireless transmissions. These security features are currently employed in the wireless standards used by companies in the telecommunications sector of New Zealand. This dissertation reveals many of the flaws of these security features. This study was conducted to consider: (i) The prevalence of current wireless standards in the telecommunications business sector of New Zealand; (ii) The perceived security of these wireless standards by companies in the telecommunications sector of New Zealand; (iii) Whether the security features of these wireless standards are suitably sufficient to ensure secure wireless transmissions; and (iv) Whether there are any reasons for slowing, or even stopping, the influx of wireless networks in New Zealand. The study concludes that businesses in this sector will use wireless networks only where they have total confidence that the networks are secure.en_NZ
dc.subjectWireless networkingen_NZ
dc.subjectconfidentiality of informationen_NZ
dc.subjectsecurity mechanismsen_NZ
dc.subjecttelecommunicationsen_NZ
dc.subjectNew Zealanden_NZ
dc.subjectsecureen_NZ
dc.subject.lcshQ Science (General)en_NZ
dc.titleWireless communications: An analysis of wireless standards in the telecommunications business sector of New Zealanden_NZ
dc.typeDissertationen_NZ
dc.description.versionUnpublisheden_NZ
otago.bitstream.pages7en_NZ
otago.date.accession2006-09-04en_NZ
otago.schoolInformation Scienceen_NZ
thesis.degree.disciplineInformation Scienceen_NZ
thesis.degree.nameBachelor of Science with Honours
thesis.degree.grantorUniversity of Otagoen_NZ
thesis.degree.levelHonours Dissertationsen_NZ
otago.interloanyesen_NZ
otago.openaccessAbstract Only
dc.identifier.eprints382en_NZ
otago.school.eprintsInformation Scienceen_NZ
dc.description.referencesThomas D. (2004, 20th September – last update), "IT Security to remain a top five business concern, says Gartner", (infomaticsonline), Available: http://www.infomaticsonline.co.uk/news/1158210 (Accessed 2004, 27th September) Mahan R. E. (2001, 14th November – last update), "Security in Wireless Networks", (sans), Available: http://www.sans.org/rr/papers/68/157.pdf (Accessed 2004, 27th September), Foster M. (2001, 22nd August – last update), "Tom's Hardware: Wireless Local Area Networking: An Introduction", (smallnetbuilder), Available: http://www.smallnetbuilder.com/network/20010822/ (Accessed 2004, 27th September). The Institute of Phonetic Sciences, "McNemar's Test", (lesn), Available: http://www.lesn.appstate.edu/olson/stat_directory/statistical%20procedureres/McNemars%20Tst/mcnemars_test.htm (Accessed 2004, 27th September). Gast, M. (2002, 19th April – last update), "Wireless LAN Security: A Short History", (oreillynet), Available: http://www.oreillynet.com/pub/a/wireless/2002/04/19/security.html (Accessed 2004, 27th September). Mitchell B., "802.11 Standards – 802.11b 802.11a 802.11g", (compnetworking), Available: http://compnctworing.about.com/cs/wireless80211.standard.htm (Accessed 2004, 27th September). Wagner D., Goldberg I., Borisov N., "Security of the WEP algorithm", (isaac), Available: http://www.isaac.cs.berkele.edu/isaac/wep-faq.html (Accessed 2004, 27 September). Arbaugh, W. A., Shankarn N., Wan, Y. C. J. (2001), "Your Wireless Network Has No Clothes", Department of Computer Science, University of Maryland Schneier, B. (2001, 15th March – last update), "Crypto-grarn newsletter", (schneier), Available: http://www.schneier.com/crypto-gram-0103.html (Accessed 2004, 27th September). Garza, S. (2004, 11th July – last update), "Indefensible WiFi Flaw Discovered", (rgj), Available: http://www.rgi.com/news/stories/html/2004/07/11/75279.php (Accessed 2004, 27th September). Hassell, J. (2004, 26th July – last update), "Wireless Attacks and Penetration Testing", (securityfocus), Available: http://securityfocus.net/infocus/1792 (Accessed 2004, 27 th September). Wave (2004, 1st September), "IEEE 802.11 Standard Tutorial", (wave-report), Available: http://www.wave-report.com/tutorials/ieee80211.htm (Accessed 2004, 27th September). Vainio, J. T. (2000), "Bluetooth Security", Department of Computer Science and Engineering, Helsinki University of Technology. Bluetooth SIG (2004), "Wireless Security", (Bluetooth), Available: http://www.bluetooth.com/help/security.asp (Accessed 2004, 27th September). "Bluetooth", (fact-index), Available: http://www.fact-index.com/b/bl/bluetooth.html#Future%20Bluetooth (Accessed 2004, 27th September). Blau, J. (2004, 11th February – last update), "Cracks Appear In Bluetooth Security", (infoworld), Available: http://www.infoworld.com/article/04/02/11/HNbluetoothcracks_1.html (Accessed 2004, 27th September). Laurie A., Laurie B. (2004, 14th September – last update), "Press release from The Bunker Secure Hosting Ltd", (thebunker), Available: http://www.thebunker.net/release-bluestumbler.htm (Accessed 2004, 27th September). Zetter, K. (2004, 6th August – last update), "Security Cavities Ali Bluetooth", (wired), Available: http://www.wired.com/news/privacy/0,1848,64463,00html (Accessed 2004, 27th September). Symantec Security Response (2004, 14th June – last update), "SymbOS.Cabir", (securityresponse), Available: http://securityresponse.symantec.com/avcentre/venc/data/epoc.cabir.hrml (Accessed 2004, 27t h September). Margrave, D., "GSM Security and Encryption", (hackcanada), George Mason University, Available: http://www.hackcanada.com/blackcrawl/cell/gsm-secur/gsm-secur.html (Accessed 2004, 27th September). Racal Research Ltd (1998, 20th April -last update), "GSM System Security Study", (jya), Available: http://jya.com/gsm061088.htm (Accessed 2004, 27th September). Brookson, C. (1994), "GSM (and PCN) Security and Encryption", (brookson), Available: http://www..brookson.com/gsm/gsmdoc.pdf (Accessed 2004, 27th September). (1998, 13th April - last update), "Cell Phone Security Far From Airtight", (kiwibyrd), Available: http://kiwibyrd.chat.ry/gsm/wir-rep.htm (Accessed 2004, 27th September). (1998, 13th April - last update), "GSM SIMs Hacked", (cellular), Available: http://www.cellular.co.za/gsm_sims_hacked.htm (Accessed 2004, 27th September). SANS Institute, (2001), "The GSM Standard (An Overview of its Security)", (sans), Available: http://www.sans.org/rr/papers/58/317.pdf (Accessed 2004, 27th September). (2003, 4th September - last update), "GSM Security Broken", (cellular-news), Available: http://www.cellular-news.com/story/9648.shtml (Accessed 2004, 27th September). QUALCOMM Incorporated (2004), "QUALCOMM HISTORY", (qualcomm), Available: http://www.qualcomm.com/about/history.html (Accessed 2004, 27th September). Wingert, C., Naidu, M. (2002, August - last update), "CDMA 1XRTT Security Overview", (zdnet), Available: http://itpapers.zdnet.com/abstract.aspx?&tag=2dfd.dir2.wplink7&sortby=title&scid=1071&docid=58168 (Accessed 2004, 27th September). Jeffery, S. (1998, 15th March - last update), "False Sense of Security", (wirelessreview), Available: http://www.wirelessreview.com/ar/wireless_false_sense_security (Accessed 2004, 27th September). Crowe, D. (1998, 1st November - last update), "Authentication: The New Generation", (wirelessreview), Available: http://www.wirelessreview.com/sr/wireless_authentication_new_generation/ (Accessed 2004, 27th September). Wagner, D., Simpson, L., Dawson, E., Kelsey, J., Milian, W., Schneier, B. (1997, 4th May _ last update), "Cryptanalysis of ORYX", (schneier), Available: http://www.schneier.com/paper-oryx.pdf (Accessed 2004, 27th September). Wagner, D., Schneier, B., Kelsey, J. (1997, 20 th March – last update), "Cryptanalysis of the Cellular Message Encryption Algorithm", (schneier), Available: http://www.schneier.com/paper-cmea.pdf (Accessed 2004, 27th September), Knight W. (2000, 22w' June last update), "Intel Admits Wireless Security Concerns", (zdnet), Available: http://news.zdnet.co.uk/internet/security/0,39020375,2079718,00.htm (Accessed 2004, 27th September). Walker, J. (2000, 15 th February – last update), "Chair of IEEE 802.11 Responds to WEP Security Flaws", (slashdot), Available: http://slashdot.org/article.pl?sid=01/02/15/1745204&204mode=thread (Accessed 2004, 27th September). Tele303 (2004), "Lecture Handouts", Department of Information Science, University Of Otago. Leedy, P.D. and Ormrod, J. E.,(2001) “Practical Research: Planning and Design", 7th Edition. Merrill Prentice-Hall (2004, 12th August – last update), “The Unofficial 802.11 Security Web Page”, (drizzle), Available: http://www.drizzle.com/~aboba/IEEE/ (Accessed 2004, 27th September), Santalesa, R. (2001, 10th July – last update), "The War Over 802,11x Security", (zdnet), Available: http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2783681,00.html (Accessed 2004, 27th September). Klaus, C. (2002, 6th October – last update), "Wireless LAN Security FAQ", (iss), Available: http://www.iss.net/wireless/WLAN_FAQ.php (Accessed 2004, 27th September).en_NZ
 Find in your library

Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item is not available in full-text via OUR Archive.

If you would like to read this item, please apply for an inter-library loan from the University of Otago via your local library.

If you are the author of this item, please contact us if you wish to discuss making the full text publicly available.

This item appears in the following Collection(s)

Show simple item record