vast array of attacks on the least secure segment of network
the client’s traffic is likely to encounter. In addition to this
added security, the client’s traffic can also be anonymized
for privacy reasons at the VPN endpoint.
6 Conclusion
With this understanding of the fundamental differences
between wired and wireless networks our task of working
toward a secured wireless infrastructure in the future should
be made easier. The idea of network promiscuity is with us
today and with the increased popularity of light weight computing
devices such as PDAs and IP enabled cell phones it
is likely to be here with us tomorrow.
It is also important to keep an eye on network
bridge technologies when considering oneself with network
promiscuity. Even if WiFi evolves successfully into a secure
technology does that device participate in other local
networks, like Bluetooth[14]? Perhaps this scenario isn’t
very realistic yet, but in the long term, such things may become
a threat in the future.
Future work will likely include a thorough evaluation of
VPN technologies to determine their strengths and weaknesses
with this application in mind. As well as improving
techniques of detecting and countering attacks similar to the
ones discussed here[15].