 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
• |
Denial
of service due to radio interference or malicious
|
|
|
|
user
|
|
|
• |
Unauthorized
and unaccounted access to the network and
|
|
|
|
Internet
|
|
|
• |
Eavesdropping
and recording other users’ traffic
|
|
|
• |
Faked
servers and networks, intercepting/diverting other
|
|
|
users’
traffic
|
|
|
• |
The
lack of traceability if many-to-one NAT is used
|
|
|
• |
Possible
access to IP-level without authentication => better
|
|
|
possibilities
to eavesdrop traffic
|
|