Illusion of wireless security

Document Type

Book chapter

Source Publication

Advances in Computers: 79

Publication Date


First Page


Last Page



Elsevier Inc.


Wireless metropolitan area networks, wireless security, smart phones, Wi-Fi security, bluetooth


This chapter examines the misunderstanding of wireless security from user behavior perspectives. Many users believe their wireless connections are safe and they do not realize the serious consequences of possible security breaches. These problems must be rectified quickly due to expanding use of wireless facilities. Corporations also underestimate the potential dangers. IT managers do not provide enough education and support for users’ wireless connections at home or public places. IT managers are not paying enough attention to issues and that pose a serious threat. Urgent action is required in light of the recent high-profile security breaches due to ignorance and negligent use. Most threats come from the ignorance of users, the inactive attitudes of corporations, and the improper implementation of security features by wireless devices manufacturers. Thus manufacturers need to develop more secure products by devoting more time to the development of security features and design of human–computer interface (HCI). As technology alone will never be able to solve all security problems, enhancement of the coordination between employers and end-users is required. In addition to discussing the truths and myths, countermeasures are presented to rectify these problems. This chapter differs from other security papers in that the minutiae of technical terms (such as algorithms, details of data frames, etc.) are avoided as far as possible so it can reach a wider audience.



Publisher Statement

Copyright © 2010 Elsevier Inc.

Access to external full text or publisher's version may require subscription.

Additional Information

ISBN of the source publication: 9780123810274

Full-text Version

Publisher’s Version



Recommended Citation

Loo, A. (2010). Illusion of wireless security. In M. Zelkowitz (Ed.), Advances in Computers: 79 (pp.119-167). doi: 10.1016/S0065-2458(10)79003-3