Wireless Security

Topics: Wireless LAN, Wireless networking, Computer network Pages: 11 (3835 words) Published: April 18, 2005
Wireless Network Security

Jon P. McKinley
TS3150 – Fundamentals of Network Design
Sunday, December 28, 2003

The Wireless Market5
Components of a wireless network6
Wireless Security Mechanisms18
Categories of Attack10
802.11 Attack Risks12
Wireless risk mitigation13

Wireless networks have grown in popularity. This is largely due to the increase in the value of a network as more users are attached to it. The value added to a network by nature of connecting more devices to it, is summarized in "Metcalf's law." Metcalf's law states that if you "connect any number, ‘n,' of machines - whether computers, phones or even cars - and you get ‘n' squared potential value."[1] The incredible growth of the Internet seems to validate Metcalf's law. It then seems reasonable that eliminating physical constraints to connecting to a network would provide value by allowing more devices to be connected to a network regardless of physical location. Wireless networks provide that ability. Wireless networks operate over the full spectrum of network topographies. These topographies include: Personal, Local, Controller, Metropolitan, and Wide area networks. A Personal Area Network (PAN) is "…the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters."[2] A Local Area Network (LAN) is "… a group of computers and associated devices that share a common communications line or wireless link and typically share the resources of a single processor or server within a small geographic area (for example, within an office building)."[2] A Campus Area Network (CAN) is a fiber-optic network that physically interconnects entire buildings into one giant network. While each building may have several discrete LANs within it, each building represents a single node on the CAN. [3] A Metropolitan Area Network (MAN) is "a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large [LAN] but smaller than the area covered by a wide area network (WAN [- explained next])."[2] A Wide Area Network (WAN) is "a geographically dispersed telecommunications network."[2] Wireless networks come in many configurations and use many technologies. Figure 1 depicts an example of the wireless technologies and standards used for each of the networks types defined above. The figure indicates two major categories of wireless technologies: fixed and mobile. The figure also indicates 10 technologies in use: Bluetooth, irDA, 802.11, IR LAN, IR Bridge, Ricochet, RF Bridge, Cellular, MCS and Satellite. Virtually all of these technologies play a role in multiple topographies. It is interesting to note that the 802.11 standard has only been assigned to the Mobile LAN and CAN topographies. It has been omitted from them PAN topography. I believe this is an oversight, and I will provide rational for this in a later section. Each wireless technology has unique security risks and concerns. Many of the risks and concerns are shared across technologies. In order to provide even a brief overview of each technology, topography, and the risks inherent to each would require a document far larger than is specified for this project. Therefore, this document will focus on the 802.11 standard as used in the PAN and LAN topographies.

Figure 1 – Types of Wireless Networks [4]

The Wireless Market
"Over the past ten years or so an alternative to wired LAN structures has evolved in the form of the Wireless LAN. The first generation Wireless LAN products, operating in unlicensed 900-928 MHz Industrial Scientific and Medical (ISM) band, with low range and throughput offering (500 Kbps), subjected to interference came to market with few successes in some applications. But they enjoyed reputation of being inexpensive due to break through...

References: [1] http://www.seas.upenn.edu/~gaj1/metgg.html - Metcalf 's Law and Legacy
[2] http://www.whatis.com - Whatis?com
[3] http://www.lib.siu.edu/faq/network1.faq.html - LAN FAQ1
[4] http://local.cips.ca/queencity/Events/archivedEvents/2000-01/SpringSeminar01/kentonjanzen/sld003.htm - Canadian Information Processing Society
[5] http://www.tml.hut.fi/Studies/T-110.557/2002/papers/zahed_iqbal.pdf - Wireless LAN Technology: Current State and Future Trends
[6] http://www.athenasemi.com/market/index.html - [Wireless] Market Overview
[7] http://www.microsoft.com/technet/treeview/default.asp?url=/technet/columns/cableguy/cg0302.asp - Microsoft TechNet
[8] http://csrc.ncsl.nist.gov/publications/drafts/draft-sp800-48.pdf - Wireless Network Security
[9] http://www.whatis.com (war driving) – Whatis?com
[10] http://www.netgear.com/pdf_docs/10StepsWirelessSecurity.pdf - Ten Easy Steps for Wireless LAN Security
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Wireless Security Essay
  • What Effects to Wireless Technologies Have on Everyday Life and Business Life and How Do These Technologies Enable Widespread Adoption and...
  • Wireless Security Essay
  • Essay about Advance Security Measures
  • Wireless Security Proposal Essay
  • Advantages and Disadvantages of Normal Lan vs. Wireless Lan Essay
  • Growth Expected in Global Wireless LAN Security Market by 2018 Research Paper
  • Essay on Wireless Security

Become a StudyMode Member

Sign Up - It's Free