Publisher Summary This chapter explores the failures and successes of wireless technology by examining how secure wireless technology really is and how secure it is becoming? It considers the security aspects that are currently in place and examines how best they can be improved. Wireless technology is here to stay and, in recognition of this, it draws upon specific implementations and reviews a number of security architectures that aim to be the building blocks of a secure infrastructure. The chapter considers the aspects of coexistence and interoperability, as these mechanisms assure a harmonious user experience. With personal-area wireless emerging and being integrated into commonplace products such as the cellular phone, everyone is becoming increasingly aware of a need to connect to a variety of service providers transparently. In a constant stream of new ideas and technologies, each purporting a range of capabilities that are superior to its nearest competitor, all technologies have to coexist in an already crowded environment. The architecture of wireless security can be likened to the requirement of a secure home—that is, securing its contents, its perimeter and surrounding grounds. The processes involved in identifying vulnerable wireless networks are known as War-Walking, War-Driving and War-Storming (or Flying). Developing Practical Wireless Applications discusses a broad range of wireless technologies, each of which uniquely imparts its own capabilities and features enabling a rich host of applications. Unavoidably, as each new technology is introduced, so too is a set of security features that individually characterizes a capability to minimize attacks or Denial of Service (DoS).