{"id":"https://openalex.org/W2166200753","doi":"https://doi.org/10.1109/malware.2008.4690863","title":"State of wireless security implementations in the United States and Europe - empirical data","display_name":"State of wireless security implementations in the United States and Europe - empirical data","publication_year":2008,"publication_date":"2008-10-01","ids":{"openalex":"https://openalex.org/W2166200753","doi":"https://doi.org/10.1109/malware.2008.4690863","mag":"2166200753"},"language":"en","primary_location":{"id":"doi:10.1109/malware.2008.4690863","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2008.4690863","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059090211","display_name":"Fernando C. Col\u00f3n Osorio","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Fernando C. Colon Osorio","raw_affiliation_strings":["Wireless Systems Security Research Laboratory, Marlborough, MA, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Systems Security Research Laboratory, Marlborough, MA, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5059090211"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3666,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.70948932,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"92","last_page":"97"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.6682659387588501},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.6673943400382996},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6613318920135498},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.6359480619430542},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5645917654037476},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.5283440351486206},{"id":"https://openalex.org/keywords/pace","display_name":"Pace","score":0.5276419520378113},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5127116441726685},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.383907675743103},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.14793643355369568},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.09256404638290405}],"concepts":[{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.6682659387588501},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.6673943400382996},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6613318920135498},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.6359480619430542},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5645917654037476},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.5283440351486206},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.5276419520378113},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5127116441726685},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.383907675743103},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.14793643355369568},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.09256404638290405},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/malware.2008.4690863","is_oa":false,"landing_page_url":"https://doi.org/10.1109/malware.2008.4690863","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1526747343","https://openalex.org/W1556597491","https://openalex.org/W2107138419","https://openalex.org/W2114566185","https://openalex.org/W2116662625","https://openalex.org/W2489776261","https://openalex.org/W2537284334","https://openalex.org/W3143753221","https://openalex.org/W6633270410"],"related_works":["https://openalex.org/W2994861451","https://openalex.org/W3181189131","https://openalex.org/W4385638864","https://openalex.org/W1981392081","https://openalex.org/W2342983920","https://openalex.org/W3177444330","https://openalex.org/W2341722066","https://openalex.org/W3134305157","https://openalex.org/W2078258147","https://openalex.org/W1915493382"],"abstract_inverted_index":{"The":[0,40,139,165],"ubiquitous":[1],"nature":[2],"of":[3,11,34,50,59,71,77,110,141,148,155,171,182,210,222,227,246,282,296],"wireless":[4,35,123,143,249,269],"devices":[5,15],"today,":[6],"and":[7,31,74,83,178,193,224,235,273,310],"the":[8,17,22,45,69,72,84,90,101,111,115,146,156,172,208,216,220,225,266,280,283,290,299,315],"potential":[9],"presence":[10],"10":[12,57],"billion":[13,58],"such":[14,37],"over":[16],"next":[18],"decade,":[19],"has":[20],"fueled":[21],"recent":[23],"interest":[24],"in":[25,29,32,145,187,219,251,265,275,298,313],"their":[26,200],"security":[27,162,197,308],"properties":[28],"general,":[30],"that":[33,47,122,151,169,268],"networks,":[36],"as":[38,289],"802.11x.":[39],"problem":[41,91],"is":[42,89],"exacerbated":[43],"by":[44,100,215],"fact":[46],"sophisticated":[48],"members":[49],"BLACKHAT":[51],"communities":[52],"can":[53,65,261,317],"potentially":[54],"compromise":[55],"all":[56],"these":[60],"devices.":[61],"Once":[62],"compromised":[63],"they":[64],"(unwillingly)":[66],"come":[67],"under":[68],"control":[70],"attacker,":[73],"be":[75,262,318],"part":[76],"an":[78,133,152,211],"attack":[79],"on":[80],"both":[81],"government":[82],"corporate":[85],"global":[86],"infrastructure.":[87,201],"Why":[88],"getting":[92],"worse":[93],"not":[94],"better?":[95],"Recent":[96],"empirical":[97],"data":[98],"collected":[99],"Wireless":[102],"Systems":[103],"Security":[104],"Research":[105],"Laboratory":[106],"(WSSRL)":[107],"highlights":[108],"one":[109],"main":[112],"reasons.":[113],"Namely,":[114],"study":[116,140,167,213],"confirms":[117],"earlier":[118],"reports,":[119],"see":[120],"www.Tomshardware.com,":[121],"networks":[124,144,157,174,184,186,250,270,297],"are":[125,301],"being":[126,302],"deployed":[127,159,272,303],"at":[128,163],"a":[129,179,230,239,293],"rapid":[130],"pace":[131],"with":[132,160,255,304],"almost":[134],"criminal":[135],"disregard":[136],"for":[137],"security.":[138],"2300":[142],"state":[147],"Massachusetts":[149],"found":[150,168],"astonishing":[153],"54%":[154],"were":[158,175,253,271],"no":[161,196],"all.":[164],"same":[166],"62%":[170],"residential":[173],"totally":[176],"open,":[177],"whooping":[180],"47%":[181],"business":[183],"(including":[185],"high":[188],"tech":[189],"companies,":[190],"financial":[191],"institutions,":[192],"banks)":[194],"used":[195],"to":[198,233,244],"protect":[199],"In":[202],"this":[203],"manuscript":[204,278],"we":[205],"will":[206],"present":[207],"results":[209],"updated":[212],"conducted":[214],"WSSRL":[217,284],"team,":[218],"fall":[221],"2007":[223],"spring":[226],"2008":[228],"during":[229],"field":[231],"visit":[232],"France":[234,252],"Italy,":[236],"which":[237,314],"encountered":[238],"dramatic":[240],"different":[241],"picture.":[242],"Close":[243],"90.78%":[245],"approximately":[247],"1,000":[248],"protected":[254],"802.11i":[256],"like":[257],"technology.":[258],"These":[259],"differences":[260],"attributed":[263],"primarily":[264],"way":[267],"configured":[274],"France.":[276],"This":[277],"summarizes":[279],"findings":[281],"study,":[285],"presents":[286],"several":[287],"hypothesis":[288],"reasons":[291],"why":[292],"large":[294],"number":[295],"US":[300],"none":[305],"or":[306],"poor":[307],"protections,":[309],"suggests":[311],"ways":[312],"deployment":[316],"improved.":[319]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
