Preview

Analysis of Wireless Security Vulnerabilities, Attacks, and Methods of Protection

Better Essays
Open Document
Open Document
7348 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis of Wireless Security Vulnerabilities, Attacks, and Methods of Protection
Analysis of Wireless Security Vulnerabilities, Attacks, and Methods of Protection

Abstract - The rapid adoption and highly distributed nature of wireless networks has made it vulnerable to attacks and calls for innovative strategies of defense for network security. The lack of cables and transfer of information over airwaves makes data exchange more susceptible to interception. Furthermore, it is difficult to implement effective methods of security without sacrificing the quality and speed of network operations. For the previous reasons, wireless security has become a common topic of interest in research projects and will be the basis of discussion for this paper.

1. Introduction
The rapid adoption and highly distributed nature of wireless networks has made it vulnerable to attacks and calls for innovative strategies of defense for network security. The lack of cables and transfer of information over airwaves makes data exchange very susceptible to interception. Furthermore, it is difficult to implement effective methods of security without sacrificing the quality and speed of network operations. For these reasons, wireless security is a topic of much interest and will be the basis of discussion for this paper. For the sake of cohesion, we will specifically discuss wireless security on the wireless network protocol IEEE 802.11 (or Wi-Fi) and its use in managed networks (or Infra-structured) though many of the topics discussed apply to other protocols as well. In our discussions, we will conduct a survey of both encryption based and non-encryption based attacks.
1.1 Overview of Wireless Security
Through the evolution of wireless networks, IEEE 802.11 (or Wi-Fi) has gained popularity as a low cost networking alternative to cabling both in households and offices for setting up Local Area Networks 2 (LANs). The protocol’s popularity and ease of use comes at a cost, however, as attackers have dedicated many resources to discovering and exploiting its



References: [1]http://wifinetnews.com/archives/2003/12/wpa.html [2]www.mulliner.org/mobilesecurity/mms_vuln_mulliner_vigna.pdf [3] www.cisco.com/.../wireless/.../brochure [4] http://eprint.iacr.org/. [5]rfweb.tamu.edu/security/.../V1comput/Wireless.htm [6] http://www.rsa.com/rsalabs/node.asp [7]www.tml.tkk.fi/Studies/Tik0.300/.../Wireless/vulnerability_2.html [8]www.willhackforsushi.com/Wireless_Threats_Practical_Exploits. [9]http://wifinetnews.com/archives/2003/11/weakness_in_passphrase_choice_in_wpa_interface.html.

You May Also Find These Documents Helpful

  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    This article gives a high level overview into the 802.11ac wireless standard. 802.11ac is also referred to as “gigabit Wi-Fi” and will be capable of significantly faster data transfer speeds than the current 802.11n. This article includes information on frequency, channels, spatial streams, beam forming and backwards compatibility. PC World is an internationally renowned computer magazine that is published monthly in print and digital form. PC World was established in 1983. The company offers advice, recommendations and information on a wide variety of technological hardware and software. The information in this article shares content that is relevant to the main points of the thesis statement (Bradley, 2012).…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Lab 6 assignments

    • 519 Words
    • 3 Pages

    Wired Equivalent Privacy (WEP) is the most widely used Wi-Fi security algorithm in the world. Wi-Fi Protected Access(WPA) was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP standard. It was formally adopted in 2003, a year before WEP was officially retired. The most common WPA configuration is WPA-PSK (Pre-Shared Key). The keys used by WPA are 256-bit, a significant increase over the 64-bit and 128-bit keys used in the WEP system. WPA has, as of 2006, been officially superseded by WPA2. One of the most significant changes between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) as a replacement for TKIP (still preserved in WPA2 as a fallback system and for interoperability with WPA).Unfortunately, the same vulnerability that is the biggest hole in the WPA armor, the attack vector through the Wi-Fi Protected Setup (WPS),…

    • 519 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Assess and design proper authentication methods for RADIUS and TACACs+ authentication servers deployments as well as IEEE 802.11 WLAN infrastructures…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Test

    • 414 Words
    • 2 Pages

    entities, materials, or equipment are necessarily the best available for the ..... WLAN Security Best Practices .......................................................................................8-1 ...…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Effective data encryption comes standard on your home network wireless router and information transmitted cannot be read without the correct encryption key. Password protection can be enabled on all devices and users should choose strong passwords of adequate length. Thefts of wireless devices are on the rise. Users can learn ways protect themselves and the device from crime, and make a loss or theft known the employer or carrier for fast action.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Understanding the risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. Maintaining secure wireless network is an ongoing process that requires greater effort that the required for other networks and systems. By assessing the risks, testing and evaluating system security controls for wireless networks more frequent can help prevent problems. There are many ways to improve the management of wireless or mobile technology like the following:…

    • 610 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Denise Clark, Joseph Huiet, Anthony Brown, Orlando Rodriguez, Niko Budworth, Cory Mooney, Armando Rocha, Denny Hoang…

    • 454 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Wormhole

    • 9395 Words
    • 38 Pages

    References: [1] P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks,” presented at the SCS CNDS, San Antonio, TX, Jan. 27–31, 2002. [2] K. Sanzgiri, B. Dahill, B. Levine, and E. Belding-Royer, “A secure routing protocol for ad hoc networks,” in Proc. IEEE ICNP, 2002, pp. 78–87. [3] Y.-C. Hu, A. Perrig, and D. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks,” in Proc. IEEE INFOCOM, 2003, vol. 3, pp. 1976–1986.…

    • 9395 Words
    • 38 Pages
    Powerful Essays
  • Better Essays

    Security Mechanism

    • 1190 Words
    • 5 Pages

    Abstract. With the advent of 2G & 3G technologies we have stepped into an era of social globalization. The GSM (also called second generation or 2G) mobile phone system uses digital signaling and speech channels. Yet several security concerns are associated with it regarding both operator & customer side. The security model designed of 2G network offers confidentiality and authentication. Authentication of the subscriber is achieved using a pre-shared key and challenge-response, whereas confidentiality is applied by encrypting the communication between the subscriber and base-station using A5/1 and A5/2 stream ciphers. However, the broadcast nature of the wireless communication and increased popularity of wireless devices introduce serious security vulnerabilities in 3G. Mobile users and providers must be assured of the correct identity of the communicating party. Encryption and Authentication are the two main security mechanisms in 3G network access securities The paper focuses on discussing all the mechanisms.…

    • 1190 Words
    • 5 Pages
    Better Essays