Preview

Wireless Network Security

Powerful Essays
Open Document
Open Document
6539 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Network Security
Wireless Network Security
Partha Dasgupta and Tom Boyd
Dept. of Computer Science and Engineering Fulton School of Engineering Arizona State University partha@asu.edu, tboyd@asu.edu Abstract
Wireless networking is inherently insecure. From jamming to eavesdropping, from man-inthe middle to spoofing, there are a variety of attack methods that can be used against the users of wireless networks. Modern wireless data networks use a variety of cryptographic techniques such as encryption and authentication to provide barriers to such infiltrations. However, much of the commonly used security precautions are woefully inadequate. They seem to detract the casual sniffer, but are unable to stop the powerful adversary. In this article, we look into the technology and the security schemes in IEEE 802.11, cellular and Bluetooth wireless transport protocols. We conclude that the only reliable security measure for such networks is one hat is based on application level security such as using a VPN.

1. Introduction The use of wireless communication for data networking has been around since the early 1990’s, mostly using proprietary technologies. The Aloha network in Hawaii (circa 1970) was one of the first data communication networks without wires. The emergence and acceptance of standards around 2000 has exploded the use of wireless access and currently (2004) several forms of wireless communication is widely used by the mainstream computing community. These forms include, amongst others, the IEEE 802.11 series of wireless products, various forms of data access provided by cellular providers and an emerging technology for short-range communication called Bluetooth. The barriers to wireless communication in the early 1990’s were many. Spectrum was in short supply, which was later resolved by the FCC opening up several large bands in the 2GHz and 5GHz ranges for unlicensed use. The price of producing hardware that operates at the multi gigahertz range fell sharply due to



References: [1] Weaknesses in the Key Scheduling Algorithm of RC4, Scott R, Fluher, Itsik Mantin, Adi Shamir, Lecture Notes in Computer Science, Revised Papers from the 8th Annual Internation Workshop on Selected Areas in Cryptography, Springer-Verlag, 2001, ISBN 3-540-43066-0 - 10 - [2] [3] “An Initial Security Analysis of the IEEE 802.1X Standard", with William A. Arbaugh, Technical Report, University of Maryland, Department of Computer Science CS-TR-4328, UMIACS-TR2002-10, Feburary 2001 http://www.cisco.com/warp/public/cc/pd/witc/ao350ap/prodlit/1680_pp.htm Accessed February 29, , 2004, Posted Thu Aug 22 06:32:08 PDT 2002, Cisco Systems, Inc. - 11 -

You May Also Find These Documents Helpful

  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    planned expansion into the east coast. One of the threats identified was the vulnerability of the…

    • 2750 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231-…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab 6 assignments

    • 519 Words
    • 3 Pages

    Wired Equivalent Privacy (WEP) is the most widely used Wi-Fi security algorithm in the world. Wi-Fi Protected Access(WPA) was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP standard. It was formally adopted in 2003, a year before WEP was officially retired. The most common WPA configuration is WPA-PSK (Pre-Shared Key). The keys used by WPA are 256-bit, a significant increase over the 64-bit and 128-bit keys used in the WEP system. WPA has, as of 2006, been officially superseded by WPA2. One of the most significant changes between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) as a replacement for TKIP (still preserved in WPA2 as a fallback system and for interoperability with WPA).Unfortunately, the same vulnerability that is the biggest hole in the WPA armor, the attack vector through the Wi-Fi Protected Setup (WPS),…

    • 519 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Consumer Electronics, IEEE Transactions on, 50(1), 231.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    A security policy is a set of actions that an institute or business plan to achieve to safeguard the establishment’s physical and untouchable (information technology) properties in writing. The security policy is thought of as a living document (the policy is constantly restructured as technology and workers specifications transforms). Safeguarding a wireless system and observing hostile actions are absolutely necessary. Therefore, wireless security policies are put in place to guard a wired network, and many businesses have started by creating written wireless security policies (Cisco,…

    • 2939 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    Assess and design proper authentication methods for RADIUS and TACACs+ authentication servers deployments as well as IEEE 802.11 WLAN infrastructures…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Financial institutions should actively monitor and notify security alert organizations for notices related to their wireless application services.…

    • 1375 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Network Infrastructure

    • 2917 Words
    • 12 Pages

    Bibliography: Anil Khatod, A. I. (2004, November 4). Five Steps To WLAN Security -- A Layered Approach. Retrieved June 1, 2012, from www.computerworld.com: http://www.computerworld.com/s/article/97178/Five_Steps_To_WLAN_Security_A_Layered_Approach…

    • 2917 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Wireless Signals

    • 551 Words
    • 3 Pages

    Wireless signals are all around us as we walk or drive around the city or town where we live. The four types of wireless technologies that are out there are Wi-Fi, Cellular, Bluetooth, and WiMAX. We will be looking at these types of wireless technologies a little more in depth, where are they most commonly used, and how they differ from one another. The first wireless technology that we will be looking at is the Wi-Fi wireless signal. The Wi-Fi signal is mainly associated with computer networking, the specification used to create a wireless local area network is the IEEE 802.11. One would use this type of wireless technology if you were a business owner opening up a coffee shop and needed a public network. The network would have a wired connection to an internet source, then leading to a wireless router that transmits and receives the data from all of the customer’s devices that want to use the Wi-Fi. This will also connect all of the devices to one another through the network. The next type of wireless technology that we will be looking at is Cellular. This type of wireless technology is most often associated with wireless telephones. The cellular network is connected to cells that will enable a user to move around freely while staying connected to the network. This type of signal is used everywhere you go nowadays and are used by everyone. There are a multitude of devices that use these networks at one time and those include, smart phones, tablets, and some computers can use the cell towers to get a signal to be able to use the internet. The first generation of cellular signals was completely analog, and from there with the growing demand of faster speeds and better connectivity technology brought us 2G, 3G, and the ever popular 4G phones. Bluetooth is the next technology that we will touch on and is very similar to the Wi-Fi and cellular networks but on…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    References: Stoneburner, Gary. “Computer Security”, Retrieved November 11, 2011, From National Institute of Standards and Technology at http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    wireshark

    • 452 Words
    • 3 Pages

    The project this week involved a deeper dive into the packet structure for the wireless protocol. Identifying the Authentication and Authorization was trickier than it appeared initially. Identifying the authentication and ciphers can come in handy when trying to identify an endpoint is not being allowed on the internet which is a frequent problem in a secure location.…

    • 452 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    References: Hausman, K., Weiss, M., & Barrett, D. (2011). Comptia security sy0-301. (3rd ed.). Pearson Education, Inc.…

    • 3395 Words
    • 13 Pages
    Powerful Essays