End-to-end wireless security: An IP VPN conspiracy theory