Affected by growing popularity of network accessibility, many organizations and individuals set up wireless network systems in different locations, such as offices, conference rooms, houses and business areas. This kind of construction helps organizations enhance portability since individuals can more from one place to another without disconnecting to certain network system. In regard with mobility, employees within organizations can connect to corporate network as long as they stay in accessible locations covered by wireless network. Based on a recent survey, it is found out that corporations that implement corporate network have increased extra 70 minutes per day of corporate network connection for average user. Therefore, employees’ productivity within these organizations has been enhanced by 22 %( Park, 2001).
Compared with traditional wired networks, wireless networks provide higher level of flexibility. Ease and speed are two main characteristics conveyed by wireless networks. It also allows temporary installations, which has significantly accumulated cost-effective advantages.
Despite of such kind of convenience, there are also some disadvantages contained within wireless network connection. For example, security issues in relative with wireless network are one challenge confronted with wireless network. Technological risks associated with wireless network can only be lessened, instead of being completely eliminated. In view of this, it is necessary for organizations that have implemented wireless network to take into account of reducing security risk to acceptable level. Moreover, a series of countermeasures are needed to be implemented prior to implementing wireless network system. Limited accessibility should be controlled and monitored by administrators of corresponding wireless network systems.
In general, this report aims at providing a brief analysis of main problems confronted by wireless network systems, such as the privacy issues and security issues. Secondly, feasible solutions to these main challenges will be analyzed. In the end, a brief conclusion and recommendation will be made.
受网络可访问性日益普及的影响，许多组织和个人在不同的地点建立了无线网络系统，如办公室、会议室、住宅和商业区。这种结构有助于组织提高可移植性，因为个人可以更多地从一个地方到另一个地方，而不断开与某个网络系统的连接。在移动性方面，组织内的员工只要呆在无线网络覆盖的可访问位置，就可以连接到公司网络。据最近的一项调查结果显示，实施企业网的企业平均每天增加了70分钟的企业网连接时间。因此，这些组织内的员工生产率提高了22% (Park, 2001)。
To sum up, this report mainly discusses main problems contained within wireless network systems. Upon analysis, it is found out that main issues confronted by wireless network systems include insecure access, exposure of private and key financial data. Under such circumstance, personal data, financial theft may occur more frequently. That’s to say, users may need to become more cautious about their private information while connecting to wireless network systems in a certain area. In general, there are three main security risks associated with wireless network system, which are intrusion, leeching and exploitation. To avoid these problems, it is necessary for network developers, users and organizations that implement wireless network systems to take into account of security issues, as well as enhancing confidentiality of their private on devices that can be connected to wireless network system.
It is recommended that organizations should upgrade their wireless network systems from time to time, so as to ensure contemporary effectiveness of their system. On the other hand, as for internet users, they need to protect their private data and avoid exposing their key financial information while connecting to public wireless network systems. In the future, more improvement should be made between different wireless network systems. This kind of practice can become helpful for enriching users’ social activities throughout the Internet.
：无线网络系统 wireless network systems
Bahli, B., & Benslimane, Y., (2004)"An exploration of wireless computing risks: development of a risk taxonomy" in Journal of Information Management & Computer Security, Vol.12, No.3, pp.245
Buratti,C.,Conti,A.,Dardari,D.,Verdone,R.,(2009)"An overview on wireless sensor networks technology and evolution" in Journal of Sensors,Vol.9,No.2,pp.1-28
CISCO Systems, (2005)"Wireless LAN solutions" Available at:
(Accessed on 15 January 2015)
Davis, R., Pease, K., (2000)"Crime, technology and the future" in Security Journal, Vol.13, No.2, pp.59
E.Shi, A.Perrig, (2004)"Designing secure sensor network" in Journal of IEEE Wireless Communication Magazing, Vol.11, No.6, pp.38-43
Hamid, R.A., (2003)"Wireless LAN: Security issues and solutions" A research paper published on the SANS Institute Reading Room Site
IBM Corporation, (2002)"Wireless security auditor (WSA)" Available at:
(Accessed on 15 January 2015)
I.F.Akyildiz, X.Wang, W.Wang, (2005)"Wireless mesh networks: a survey" in Journal of Computer Networks, Vol.47, No.4, pp.445-487
J.Konorski, M.Kurant, (2004)"Application of a hash function to discourage MAC-layer misbehavior in wireless LANS" IN Journal of Telecommunications and Information Technology, Vol.2, No.3, pp.38-46
L.Salgarelli, M.Buddhikot, J.Garay, S.Patel, S.Miller, (2003)"Efficient authentication and key distribution in wireless IP networks" in Journal of IEEE Wireless Communications Magazine, Vol.2, No.1, pp.11-17
Mulliner, C., (2005)"Security and privacy issues of wireless technologies" in Journal of Wireless Technology, New Applications and Social Interaction, pp.1-34
Park, J.S., Dicoi, D., (2001)"" Available at:
(Accessed on 14 January 2015)
S.Miller, (2001)"Facing the challenge of wireless security" in Journal of Computer, Vol.34, No.7, pp.16-18
Urbas, G., Krone, T., (2006)"Mobile and wireless technologies: security and risk factors" in Journal of Trends & Issues, Vol.3, No.2, pp.1-6
Y.X.Lim, T.S.Yer, J.Levine, H.L.Owen, (2003)"Wireless intrusion detection and response" in Proceedings of Information Assurance Workshop, IEEE Systems, Man and Cybernetics.USA: West Point, pp., 68-75