During the infancy of the wireless computing age, key defenses and deterrents to wireless attacks were the cost and complexity of methods required to partake in such activities. The current age of easily accessible, inexpensive tools have tilted the balance of price, complexity, and deterrence in favor of the novice wireless attacker. During year 2005, over a billion wireless users are projected (Lauter, 2004). As of this writing, the wireless security discussion is in escalation. This paper is a brief participant of the
discussion, and concludes multiple security mechanisms (a hodgepodge, instead of a single solution) provide maximum wireless security.
This document is in PDF format. To view it click here.