Illusion of wireless security

Wai Sing, Alfred LOO

Research output: Book Chapters | Papers in Conference ProceedingsBook ChapterResearchpeer-review

2 Citations (Scopus)


This chapter examines the misunderstanding of wireless security from user behavior perspectives. Many users believe their wireless connections are safe and they do not realize the serious consequences of possible security breaches. These problems must be rectified quickly due to expanding use of wireless facilities. Corporations also underestimate the potential dangers. IT managers do not provide enough education and support for users’ wireless connections at home or public places. IT managers are not paying enough attention to issues and that pose a serious threat. Urgent action is required in light of the recent high-profile security breaches due to ignorance and negligent use. Most threats come from the ignorance of users, the inactive attitudes of corporations, and the improper implementation of security features by wireless devices manufacturers. Thus manufacturers need to develop more secure products by devoting more time to the development of security features and design of human–computer interface (HCI). As technology alone will never be able to solve all security problems, enhancement of the coordination between employers and end-users is required. In addition to discussing the truths and myths, countermeasures are presented to rectify these problems. This chapter differs from other security papers in that the minutiae of technical terms (such as algorithms, details of data frames, etc.) are avoided as far as possible so it can reach a wider audience.
Original languageEnglish
Title of host publicationAdvances in Computers: 79
PublisherElsevier Inc.
Number of pages49
ISBN (Print)9780123810274
Publication statusPublished - 1 Jan 2010


  • Wi-Fi security
  • Wireless metropolitan area networks
  • bluetooth
  • smart phones
  • wireless security


Dive into the research topics of 'Illusion of wireless security'. Together they form a unique fingerprint.

Cite this