 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
• |
WEP
(Wireless Equivalent Privacy) encryption
|
|
|
|
– |
unique
and common shared secrets
|
|
|
|
– |
changing
the shared secret often, key exchange secured by vendor
|
|
|
|
specific
solution
|
|
|
• |
IPSEC
/ VPN, encrypting traffic on IP level, the authentication of user
|
|
to
network and the network to user
|
|
|
• |
MAC
address access filtering in WLAN access point (AP)
|
|
|
• |
Vendor
specific solutions like Lucent’s ”closed network” setting.
|
|
|
• |
Legislation
concerning deliberate interference of telecommunications
|
|