What parts of Network Security Apply to Wireless Security? Phillip G. Bradford Department of Computer Science University of Alabama October 10, 2003 11-11:50 AM Room 3501, HKUST Abstract: A great deal of work has been applied to large-scale network security. This talk starts by discussing good software development: refitting and refactoring of network systems to constrained wireless devices and some possible unintended security consequences. Next, some of Claude Shannon's work on network security is applied to wireless security. In particular, a key result of Shannon is generalized and explored. This leads to the second thrust of this talk. New potential attacks on wireless networks of constrained devices. Some of this is joint work with D. Cordes, O. Gavrylyako, J. Jones, A. Parrish, and R. Smith