Preview

Implementation of Security for Wireless Network

Powerful Essays
Open Document
Open Document
3544 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Implementation of Security for Wireless Network
Implementation of Security for Wireless Network
R.Sridevi (Asst.Prof)
Department of Computer Science
PSG College of Arts & Science
Coimbatore, TN. srinashok@gmail.com Abstract -This paper addresses the internal and the external security challenges in organizations that implements wireless networks. Distributed security is designed to provide a more secure data communication among faculty members, staff and students. A description of the technique used to protect and keep PC 's up and running is illustrated with applications.

Keywords: Access point, LAN.

1. INTRODUCTION The market for wireless communications has experienced incredible growth over recent years and wireless LANs have rapidly become a very important network architecture offering benefits of increased flexibility and mobility. Unlike a traditional wired LAN, users can access servers with much greater freedom. Mobility in IP architecture as well as mobility between wireless LANs and wireless WANs enhances these benefits even further. Such benefits of mobility and access come with significant security and performance requirements. The importance of maintaining secure and reliable connections between 'the communicating parties is often underestimated or even ignored. Security risks in wireless networks are equal to the sum of the risk of operating a wired network plus the new risks introduced as a result of the portability of wireless devices [I]. To reduce these risks, organizations need to adopt security measures and practices, which lower such risks to a manageable level. WLANs do not replace wired solutions but complement them. It provides network connectivity in difficult wiring areas and allows mobile users to work with Traditional wired applications with high throughput for both indoor and outdoor environments. Although WLANs came into the market almost a decade ago, standardized WLANs have been available since the late 1990s when IEEE 802.11 was born. There



References: [1]Karygiannis, T., and Owens, L., (2002). Drof: Wireless Nerwork Securir) ' -802.11, Bluetooth and Hond held Devices. USA. National Institute of Standards and cchnalagy [2]Hunt, R., Vargo, J., Wang, J., Impact of Security Architectures on Wireless Network Performance, 51h IEEE International Conference an Mobile and Wireless Communications Networks (MWCN 2003), Pages 331-334, Singapore 27-29 October, 2003 [3]Lewis Z. Kock, "Outsourcing Security", ZDNet Interactive week, 2000. .t. Markbam T. & Payne C. "Security at the network Edge: A Distributed Firewall Architecture", IEEE-CNF, 2001. [4]S. Harris, "ALL IN ONE CISSP Certification ", McGraw / Osborne, 2002. [5]. 2278- 6643) | Volume-1 Issue-3, December 2012 IJRREST: International Journal of Research Review in Engineering Science and Technology (ISSN Subhash Kumar, Arun Kumar Rathode, Rajesh Singh M.Tech. Scholar, Bhagwant University, Ajmer, Rajasthan, India

You May Also Find These Documents Helpful

  • Good Essays

    Wireless connections open our network to potential threats. We should do everything possible to limit the number of allowed wireless devices on our network. I suggest that we enforce a policy of a primary and secondary wireless network. This would allow us to give our employees the functions they need while maintaining a secure network. Our primary network will be secured with Wi-Fi Protected Access version 2 (WPA2) and the user of a complex passphrase to prevent brute force attacks. This section of our network will have a limited number of users allowed,…

    • 904 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Upgrading to an optimized WLAN architecture, using 802.11n technology, provides Highbrow Ed with a scalable, efficient, high-performing wireless network. An optimized WLAN architecture combines the advantages of central management and addresses the limitations of having a central wireless switch. Optimized WLAN consists of intelligent Access Points (Aps) and a WLAN controller. The APs forward traffic and enforce security and prioritization policies, while the WLAN controller centrally manages and controls all APs. The APs dispatch all traffic directly from source to destination without requiring a detour to the controller.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    There are many threats a network faces when the IT department allows students to connect to the network or Internet using mobile devices. Some threats affect the campus network only, while other threats directly affect students or employees. For the campus network, threats include…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    References: Rowan, T (2010), Negotiating WiFi security, Network Security, Vol. 2010, Issue 2, pp. 8–12.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Activity 1

    • 667 Words
    • 3 Pages

    Although the freedom to roam the facility and always be connected to the LAN can be a great advantage for network users, the amount of support needed to manage the system and users is much higher than that required by a wired network. Due to the broadcasting nature of a wireless system, security is an important concern and provisions should be made for guest / unauthorized users to use the system in a limited and controlled way. Additional support by the IT Team is often required to configure a user to use the wireless network, to ensure the wide variety of hardware will work with the College’s wireless system, and to provide Help Desk support for wireless…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The internet has pervaded every aspect of business and Kudler Fine Foods has used it as a tool to further their goals. Wireless technology should be the next stepping stone for Kudler to use to advance in their field, and much like most new technologies the use of wirelessly connected devices can pose a number of security concerns. The benefits of having connectivity throughout the enterprise can outweigh the security concerns that wireless technology can pose. There are certain steps that can be taken to mitigate most of the concerns of having wirelessly connected devices on the network and these steps will be touched upon along with some of the major threats.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    The Infrastructure deployment scenario will allow for wireless access points (WAPs) to be connected to the existing wired network allowing employees with wireless devices the ability to access the company’s network. This is a commonly used method of enhancing an existing wired network while adding the benefit of mobility to employees and is a cost-effective way to upgrade to a wireless local area network (WLAN). On-the-go employees can potentially improve job productivity while in the Conference Center by having the ability to wirelessly access company printers, file servers, and Internet and/or Intranet without the need to plug into the company network.…

    • 2305 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Riordan Enterprises has requested to look into the possibility of adding wireless capabilities to their existing network. The need for wireless is understandable. It enables employees to be productive from anywhere. If they need to travel to a potential customer in Montana, or are at a plastics conference in Hawaii the ability to connect to the Riordan’s intranet is vital. Not only does it allow the employee to continue to stay connected with work, it also allows them to share the intranet and all it has to offer to potential clients, as well as offering those potential clients use of the system for easier ordering and up to date financial and tracking information regarding their purchases. This is why a Virtual Private Network would be a good tool to add to the Riordan tool bag. It will allow the current network to stay intact as well as adding the ability to access the network from anywhere. This adds in the efficiency and productivity of Riordan and its many employees and global locations.…

    • 2267 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    The advent of wireless technology is due in part to the ever increasing demands for mobility and flexibility in our daily lives. A wireless LAN (WLAN) is based on cellular architecture where the system is subdivided into cells,…

    • 929 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Understanding the risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. Maintaining secure wireless network is an ongoing process that requires greater effort that the required for other networks and systems. By assessing the risks, testing and evaluating system security controls for wireless networks more frequent can help prevent problems. There are many ways to improve the management of wireless or mobile technology like the following:…

    • 610 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    With the introduction of wireless edge devices on a network it has an increase in performance and freedom compared to those who use a wired connection. With fewer user on the wireless network than on the wired network, traffic and user are fewer, which makes the network faster comparably. But as we have learned, increases in wireless traffic have problems like physical obstacles, interference from other wireless devices, the distance from an access point, and access rights to other…

    • 1245 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Network Infrastructure

    • 2917 Words
    • 12 Pages

    Bibliography: Anil Khatod, A. I. (2004, November 4). Five Steps To WLAN Security -- A Layered Approach. Retrieved June 1, 2012, from www.computerworld.com: http://www.computerworld.com/s/article/97178/Five_Steps_To_WLAN_Security_A_Layered_Approach…

    • 2917 Words
    • 12 Pages
    Better Essays
  • Better Essays

    Network Hardening

    • 2847 Words
    • 12 Pages

    Cited: Ciampa, M. (2012). Security guide to network security fundamentals. (4 ed.). Boston: Course Technology, Cengage Learning.…

    • 2847 Words
    • 12 Pages
    Better Essays
  • Good Essays

    To address the issue of data confidentiality, network will include a domain (EROS) and all stations, and user will be part of the domain. Through the use of active directory (AD), users will be granted access to the organization resources, based on their function and roles in the organization. Each use will be given a network account that will allow them access to the necessary means to perform their job. The wireless configuration will allow employees to connect to EROS-Employee Wi-Fi using two levels of security; MAC filtering and user authentication. Only devices, which physical address has been authorized will have access to the secured employee wireless network. In order to prevent employees from the 4th floor to see the wireless network and attempt to connect to it, EROS SSID will not be broadcast at all. The wireless configuration is part of EROS base image, for laptops, and can be setup on EROS provide mobile devices with a script. There is also a secured EROS Guest Wi-Fi for employees’ personal devices and guests. The wireless configuration is WPA2 and uses advance encryption standard (AES). The access key to the guest wireless will be reset on a weekly basis and user is able to retrieve the updated password from EROS intranet site. The IPsec tunnel configured for the organization offers encryption, data checksum, and user authentication.…

    • 755 Words
    • 4 Pages
    Good Essays