Sri Harsha Maddineni Z1725592 CSCI 630-3 Security Enhancements in IEEE 802.11 Wireless LANs through Wired Equivalent Privacy protocol
Introduction:
Wireless networks are less secure when compared to wired networks. Wired networks such as Ethernet are physically connected, where as in wireless networks are connected through wireless radio waves without physical connection between them. As a result, a security breach is easier in wireless networks when compared to wired networks. In the current world, electronic gadgets like cell phones, ipads and laptops are interconnected with other devices. In wireless device, a network radio receiver is able to hear the conversations on a wireless channel as per its range. Therefore it is easier to breach the conversations that are occurring in wireless networks. The data that is transferred on the internet should be reliable and secure because it might contain personal data information like bank login details or insurance details etc. To prevent the issues that are happening over the network, there are different algorithms used in day to day life by software engineers while designing the network. Among them Wired Equivalent privacy algorithm is most important one. The main purpose of this algorithm is to produce integrity, reliability and security to data that is transferred on a wireless network. The thesis that I am writing is used for software engineers who are interested in implementing WEP protocol for their network designs and
In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in
Privacy: In a wireless network all the devices are able to hear data traffic within their ranges which can be a threat to the security of the link. IEEE 802.11 counters this problem by offering a privacy service option that raises the security level of the 802.11 network to that of a wired network.
The network level security will form the relationships of authentication, encryption and authorization for the wireless network and its connectivity between wireless clients to the internal network. Some recommendations are:
Wireless Routers is a wireless local area network (WLAN) that determine the next route of the packet should travel to the destination (Rouse, 2005). It converts the internet connection that was received from phone lines into radio signals and brings convenience to the portability devices that has built-in network card to gain the radio signals to get to the Internet connection (Switcher, 2015). Table 2 refers to the comparison of three models of wireless router.
Wired network uses cables to connect devices to the internet, however, wireless network uses radio waves to devices to connect internet.
To improve security, the Wi-Fi uses various built-in WEP encryption technologies to prevent attacks from
Outline a wireless network and technology that you use regularly. The WLANs which are derived from the IEEE 802.11 standards, and marketed under the Wi-Fi trademark name. The WLANs security is neither forthright/candid nor simple, and it is continuously varying. Even though, as WLAN increase client output, they also expose the networks to a new group of potential hackers. With the present inherent security weakness of the 802.11 standard, all companies, small, medium or large, need to find out their security conditions derived from the applications using the WLAN. The standards also provide requirements for high-speed networks that support most modern-day applications. What sorts of security issues do
Wireless attacks have becoming a more common security issue when it comes to networks. Attacks can get a lot of information that is being sent across a network and use to commit crimes in other networks. Every wireless network is vulnerable to attacks and it is the important that all the necessary security measures are taken so as to prevent the mess these attacks can cause. These attacks are normally carried out to target information that is being shared through the networks. It is therefore very important to know of such attacks so you will be able to identify the attack when it happens.
WEP is an older security protocol for wireless networks that encrypts transmitted data. WEP uses a security code chosen during configuration called a WEP key, which uses a sequence of hexadecimal digits. WEP keys can be formed in different lengths depending on the type of WEP encryption being utilized. However it is generally not recommended to use WEP especially when we’re talking about networks that need more advanced security. The biggest disadvantage found with WEP is really it’s main weakness, a skilled hacker could actually crack the security key within a matter of minutes using special software.
The vulnerabilities of wireless networking may involve the attack of web browsers, on-line banking, DNS servers, and routers exchanging routing table updates, purchases, transactions or stolen personal data. The lack of security with a wireless system may result in denial of service, hijacking, fake impersonation, or eavesdropping for interception of messages through cyber-crimes. Each communicating user should select the language of cryptography, agree and share the symmetric key. The best security practices includes firewalls, intrusion detection systems, secured and updated applications, transport, configured properly working network, and link layers.
• Interception: is considered to be a passive attack in which the intruder listens and records the sent encrypted messages to be decrypted later on.
While wireless is often considered Ethernet, it uses CSMA/CA (Carrier Sensing Media Access/Collision Avoidance). Wireless network security and signal interference has been a real concern for network administrators. Most of these concerns have been addressed, but the reputation of being a largely free and wide-open media still lingers.
Confidentiality: It prevents the access to the data for unauthorized users or nodes when two authorized nodes are communicating .Since MANETs use the open medium, all users present within the transmission range will have access to the data. The data can be kept confidentially by performing encryption on it.
Within this article, the authors states that in order to provide a safe and secure wireless network, they outlined the counter attacks and measures for the security of wireless networks. Some of the counter attacks that the authors have listed includes, system security - which breakdowns to administrative level security, physical level security, and technical level security, and information security (Ameen et al, 2012). For the purpose of answering the previous question, the main counter attack that would best defend against the problems would be system security - particularly the administrative level security. At this level of security, administrative control over the system by establishing a well defined user hierarchy plus a strong authentication measures, can prevent security breaches of WLANs from
A wireless network is any type of computer network that uses wireless data connections for connecting network nodes .Wireless networking is a method by which homes, telecommunications networks and enterprise (business).Installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure.