Preview

Wi-Fi Security

Powerful Essays
Open Document
Open Document
1913 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wi-Fi Security
Wi-Fi is the system of wireless connecting devices, which use some radio waves that allow for the connection between the devices without expenses of the cumbersome cable or without requiring them for being facing the other. Wireless-Fidelity (Wi-Fi) network would provide the computer experts with option to remove the wired network (Wekhande, 2006). Badly secured Wi-Fi networks may be utilized for attacking the networks as well as corporations from inside, rather than about attempting to do that externally by Internet. The purpose of the report is to describe about the Wi-Fi Security. Firstly it discusses Wi-Fi (802.11) Security. Then it reviews the risks as well as the precautions prior to opening the Wi-Fi network for the others, after that it gives recommendations for closing the Wi-Fi Network to the strangers and how to be alert while sending very sensitive information over the Wi-Fi Networks.
What is Wi-Fi Security?
Wi-Fi is cryptographic based methods for enabling the security. Wired Equivalent Privacy as well as Wi-Fi Protected Access security techniques give us security (Rowan, 2010). Privacy: the data that has been transmitted within a network must not be readable to anybody however those communicating. Authentication: Only clients who are aware about shared secret can connect to network. Wi-Fi Protected Access had been initial cryptographic protocol which has been made for the Wi-Fi for enabling the privacy as well as authentication. But Wi-Fi Protected Access had not been fully secure. For rectifying the security issues with Wi-Fi Protected, Wi-Fi Alliance has introduced cryptographic protocol i.e. Wi-Fi Protected Access. From that time the general practice about securing the Wi-Fi Protected Access enabled network with the passwords was discovered of being vulnerable towards the offline dictionary attack. Even if Wi-Fi Protected Access has been thought to be very secure rather than from the dictionary attack, this had been the quick fix to problems in



References: A.K.M Nazmus Sakib, e. a. (2011). Security Improvement of IEEE 802.11i Wi-Fi Protected Access 2 Fleishman, G. (2011). How to stay safe at a public Wi-Fi hotspot. Gold, S. (2011). Cracking wireless networks. Network Security , 14-17. Helping Define 802.11n and other Wireless LAN Standards. (2012). Retrieved February 12th, 2012, from http://www.intel.com: http://www.intel.com/standards/case/case_802_11.htm Kjell J. Hole, E. D. (2005). Securing Wi-Fi Networks. Published by the IEEE Computer Society , 28-34. Ku, A. (2011). Wi-Fi Security: Cracking WPA With CPUs, GPUs, And The Cloud. Retrieved February 12th, 2012, from http://www.tomshardware.com: http://www.tomshardware.com/reviews/wireless-security-hack,2981.html Lehembre, G. (2005). Wi-Fi security – WEP, WPA . http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_EN.pdf . Reynolds, J. (2003). Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network Roeder, F. O. (2003). Wi-Fi Handbook. New York: McGraw-Hill. Rowan, T. (2010). Negotiating WiFi security. Network Security , 8-11. Sheldon, T. (2001). Encyclopedia of Networking. New York: McGraw-Hill. US-CERT. (2006). Using Wireless Technology Securely. Government organization. Waring, B. (2007). How to Secure Your Wireless Network. PCWorld . Wekhande, V. (2006). WI-FI TECHNOLOGY: SECURITY ISSUES. RIVIER ACADEMIC JOURNAL, VOLUME 2 , 1-17. Wireless Security. (2012). Retrieved February 12th, 2012, from http://www.findingdulcinea.com: http://www.findingdulcinea.com/guides/Technology/Internet/Internet-Security/Wireless-Security.html

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    7. Because WiFi signals are radio waves, anyone within range of a public WiFi network can listen in on what users are sending and receiving.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Another way to protect your WLAN is with WPA (WI-FI Protected Access). WPA is an upgrade to the WEP(Wired Equivalent Privacy). WEP regulates access to wireless network through a devices hardware-specific MAC address.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    eviltwinattack

    • 3867 Words
    • 15 Pages

    According to a recent study, 42% of wireless 802.11 access points (APs) provide no security mechanisms — not even WEP or WPA [1]. Often times, wireless APs are left open for convenience. For example, a coffee shop or bookstore may wish to offer a free wireless service, so there is no need to authenticate its wireless users. However, wireless clients that use these APs are vulnerable to a number of trivial threats such as eavesdropping and injection attacks. An additional and often over-looked vulnerability caused by using open APs is the access point impersonation attack.…

    • 3867 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Josh

    • 6922 Words
    • 28 Pages

    References: 1. Andrea Bittau, Mark Handley, and Joshua Lackey. The final nail in WEP’s coffin. In IEEE Symposium on Security and Privacy, pages 386–400. IEEE Computer Society, 2006. 2. Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications: the insecurity of 802.11. In ACM MobiCom 2001, pages 180–189. ACM Press, 2001. 3. Rafik Chaabouni. Break WEP faster with statistical analysis. Technical report, EPFL, LASEC, June 2006. http://lasecwww.epfl.ch/pub/lasec/doc/cha06. pdf. 4. Stefan D¨rh¨fer. Empirische Untersuchungen zur WLAN-Sicherheit mittels o o Wardriving. Diplomarbeit, RWTH Aachen, September 2006. (in German).…

    • 6922 Words
    • 28 Pages
    Good Essays
  • Powerful Essays

    Google Wi-Spy

    • 3366 Words
    • 14 Pages

    Securing Wi-Fi Network, Blog. Securing Wi-Fi Network. June 27, 2013. http://googleblog.blogspot.com/2013/06/securing-your-wifi-network.html (accessed June 27, 2013).…

    • 3366 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Nowadays, Wi-Fi becomes a critical role in Hotel Business. As you know that, in today’s digitally connected world, all PC’s have Wi-Fi and an estimated 85% of mobile phone also has built in the Wi-Fi. In addition, guests in Hotel desire for access to the Internet during their stay continue to be strong. In the following, I will briefly describe about the advantage of using Wi-Fi in Hotel Business.…

    • 1141 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    [The rapid growth and development of mobile systems over the past years has exposed the capability and effective availability of mobile communication and thus paved the way for secure transmission and execution of data. Mobile communications also provide us too many type of connection to access to internet with their few security mechanisms build inside. ]…

    • 561 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Wi-Fi usage has been on the upswing recently, thanks to the rise of smartphones, especially the iPhone. Whether it is airports or cafes, people are increasingly logging onto Wi-Fi networks.The case talks about free Wi-Fi in various areas of businesses like restaurants, airports etc to attract crowd and to increase their business. It talks about transition from Wi-Fi – for money to Wi-Fi as a lure. The various strategies implemented by these businesses to give away free public Wi-Fi. Various issues like pricing, security issues etc are discussed in detail in the analysis below. The case also talks about newer trends like mobile broadband which may be a threat to Wi-Fi networks.…

    • 5386 Words
    • 22 Pages
    Good Essays
  • Good Essays

    Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a MANET is independently free to move in any direction, and will therefore change its connections to other devices frequently. So one of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists.…

    • 910 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The college society is changing under the influence of Wi-Fi technology. The college society is enjoying the new and influential network in many ways, but is yet developing constantly improvements how to make the technology even more effective by introducing new programmes and procedures.…

    • 1402 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    When used with other 802.11g WPA (WiFi Protected Access) and 802.1x compatible products in a network with a RADIUS server, the security features include:The multihop wireless environment is characterized by harsh propagation channels, interference, frequent and rapid changes in network topology, a lack of centralized network control, and the requirement of multihop communication from source to destination.Many of present wireless network applications will require that mission-critical data should be guaranteed to be delivered to their corresponding targets in time. However, end-to-end QoS (Quality of Service) assurance in multihop networks is a very challenging topic [1][2].For home users that will not incorporate a RADIUS server in their network, the security for the DI-524, used in conjunction with other 802.11g products, will still be much stronger than ever before. Utilizing the Pre Shared Key mode of WPA, the DI-524 will obtain a new security key every time it connects to the 802.11g network. You only need to input your encryption information once in the configuration menu. No longer will you have to manually input a new WEP key frequently to ensure security, with the DI-524, you will automatically receive a new key every time you connect, vastly increasing the safety of your…

    • 2425 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Wateen Telecom Branding

    • 3462 Words
    • 14 Pages

    Wi-MAX is a Worldwide Interoperability of Microwave Access. Wi-MAX is described in IEEE 802.16e Wireless Metropolitan Area Network (MAN) standard which has been introduced in Pakistan by AD consortium Wateen. Wi-MAX compliant systems provides fixed wireless alternative to conventional DSL and Cable Internet. Wateen Telecom is using Motorola 's Wi-MAX technology to provide wireless fixed broadband data services for residential and corporate use. The company is using Wi-MAX as a cost effective and fast-to-deploy broadband solution, as part of its strategy to create a world-class communications network in Pakistan. It brings you the ability to communicate and connect via voice with your family, clients and business partners seamlessly. But Wateen Wi-MAX faced criticism by the customers due to some flaws in their technology and services. They couldn’t get that much appreciation in the market as the company was expecting. People were unaware of the technology that Wateen launched. The operation and installation services were not provided properly and people were dissatisfied due to lack of knowledge about product, operation and ineffective advantages they expected to get. The product price was high as they had high security charges. So that why wateen started losing its customers because of the their insecure network, bad customer services, and for many other reasons they gradually started losing its market share.…

    • 3462 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    [13] Ramaraj, E and Karthikeyan, S, “ A Design of Enhanced Security Protocol for Wireless Communication…

    • 3590 Words
    • 15 Pages
    Powerful Essays

Related Topics