preview

Implementation of Security for Wireless Network

Better Essays

Implementation of Security for Wireless Network
R.Sridevi (Asst.Prof)
Department of Computer Science
PSG College of Arts & Science
Coimbatore, TN. srinashok@gmail.com Abstract -This paper addresses the internal and the external security challenges in organizations that implements wireless networks. Distributed security is designed to provide a more secure data communication among faculty members, staff and students. A description of the technique used to protect and keep PC 's up and running is illustrated with applications.

Keywords: Access point, LAN.

1. INTRODUCTION The market for wireless communications has experienced incredible growth over recent years and wireless LANs have rapidly become a very …show more content…

• Fabrication: is considered to be an active attack in which the intruder generate a non-original message and sent it to the receiver.
• Interception: is considered to be a passive attack in which the intruder listens and records the sent encrypted messages to be decrypted later on.
• Brute Force: is considered to be a passive attack in which the intruder will generate every possible
Some security measures include:

l. Use of Intrawalls: Firewalls that separate an organization from the Internet are blind to attacks launched by unwitting insiders and hostile insiders. These firewalls may provide some protection unless client to server VPNs are used. These VPNs effectively blind perimeter firewalls. The firewall functions may be moved deeper into the network. Intrawalls suffer from the following shortcomings.

2. Use of Network Edge Security: Network Edge Security is the second-generation firewall architecture which changes 1st generation firewall paradigms. Network Edge Security pushes network security policy enforcement to the edge of the network (in other words all the way to the host) to address the insider problem. The architecture is not host-based software such as personal firewall but it is a host operating system independent and hardware based implementation on NIC (network interface card), with its own processor and memory that cannot be accessed by the host [5]. Network Edge Security

Get Access