Australian Defence Force Policy and the use of WPA2 as a Security Option for Deployment of 802.11 Wireless Networks in the Field
ABSTRACT
The wireless function is an under utilised resource for many military organisations. Until recently, Defence wireless local area network assessments have highlighted wireless inadequacies in relation to data security and the protection of sensitive information. But since the introduction of WPA2 and the acquisition of wireless applications into U.S Dept. of Defence networking infrastructure, global defence departments are testing wireless applications for advantages in the military domain. This paper examined WPA2’s security mechanisms and their relationship with the Australian Defence Force policy and military operational environments. Though still officially unacknowledged in the Australian military landscape, WPA2 offers a robust security solution that can potentially provide the Australian Defence Force with the networking flexibility that only wireless delivers. The analysis conducted here suggests that the use of wireless networks to support military operations when secured using WPA2 methods is feasible.
AUTHORS
Security Research Centre, Edith Cowan University
Western Australia
Drew McEniery lives and works in Perth, Western Australia. He is currently working for the Australian Department of Defence in the Royal Australian Air Force as a Military Police law enforcement operative. Drew attained a Masters of Information Security and Intelligence in 2008.
Security Research Centre Edith Cowan University
Western Australia
Andrew Woodward is a lecturer in wireless networking with the School of Computer and Information Science at Edith Cowan University. Andrew has presented papers in wireless network security and wireless security management. Current areas of research include wireless 802.11 vulnerabilities, RFID tags, intrusion detection, wireless honeypots and computer clustering.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive