Implementation of Security for Wireless Network

Only available on StudyMode
  • Download(s) : 170
  • Published : February 21, 2013
Open Document
Text Preview
Implementation of Security for Wireless Network
R.Sridevi (Asst.Prof)
Department of Computer Science
PSG College of Arts & Science
Coimbatore, TN.
srinashok@gmail.com

Abstract -This paper addresses the internal and the external security challenges in organizations that implements wireless networks. Distributed security is designed to provide a more secure data communication among faculty members, staff and students. A description of the technique used to protect and keep PC's up and running is illustrated with applications.

Keywords: Access point, LAN.

1. INTRODUCTION
The market for wireless communications has experienced incredible growth over recent years and wireless LANs have rapidly become a very important network architecture offering benefits of increased flexibility and mobility. Unlike a traditional wired LAN, users can access servers with much greater freedom. Mobility in IP architecture as well as mobility between wireless LANs and wireless WANs enhances these benefits even further. Such benefits of mobility and access come with significant security and performance requirements. The importance of maintaining secure and reliable connections between 'the communicating parties is often underestimated or even ignored. Security risks in wireless networks are equal to the sum of the risk of operating a wired network plus the new risks introduced as a result of the portability of wireless devices [I]. To reduce these risks, organizations need to adopt security measures and practices, which lower such risks to a manageable level. WLANs do not replace wired solutions but complement them. It provides network connectivity in difficult wiring areas and allows mobile users to work with Traditional wired applications with high throughput for both indoor and outdoor environments. Although WLANs came into the market almost a decade ago, standardized WLANs have been available since the late 1990s when IEEE 802.11 was born. There are two types or modes of WLANs exist, the technology

U.Sinthuja (Research Scholar)
Department of Computer Science
PSG College of Arts & Science
Coimbatore, TN.
sint@techie.com

that provides connectivity to the infrastructure network and the technology that provides the connectivity of one device to another or an ad hoc network. IEEE 802.11based WLANs work in both modes. IEEE 802.1 Ib works in the 2.4 GHz band, like 802.11g, while the IEEE 802.1 la solution works in the 5 GHz frequency band. These spectrums are license free.

2. SECURITY ARCHITECTURES IN WIRELESS LANs
Wireless LANs provide greater flexibility and portability than do traditional wired LANs. Unlike a wired LAN, a wireless LAN connects computers and other components to the network via a wireless Access Point (AP). IEEE 802.11 is an international standard which provides transmission speeds ranging from 1 Mbps to 54 Mbps in either the 2.4GHz or 5 GHz frequency bands. In addition it incorporates the IEEE 802. ix authentication protocol (an enhancement for default WEP authentication) which employs port-based network access control. It is used for communication between wireless clients and an AP, while RADIUS operates between an AP and an authentication server. IEEE 802.1 was proposed to address WEP vulnerabilities by providing access control and key distribution to any (wired or wireless) Ethernet port. The link layer security provisions in the IEEE 802.1 1 standards are all vulnerable to attacks. Therefore in practice, implementations need to deploy additional higher-level security mechanisms such as access control, end-to-end encryption, password protection, authentication, virtual private networks, firewalls, etc and assume WEP as a very basic layer of security only.

3. ISSUES AND SECURITY ATTACKS
In this section, issues and security attacks that wireless networks security protocols are vulnerable to will be mentioned and some explanation will be provided: •...
tracking img