Security in Wireless Local Area Network
|
|
|
- Holly Howard
- 10 years ago
- Views:
Transcription
1 Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice June 2006, Mayagüez, Puerto Rico Security in Wireless Local Area Network Shamila Makki, Ph.D. Candidate, Department of Electrical and Computer Engineering Florida International University, Miami, FL, USA Subbarao V. Wunnava, Ph.D, P.E. Professor, Department of Electrical and Computer Engineering Florida International University, Miami, FL, USA Abstract A new type of Local Area Network (LAN) called Wireless LAN (WLAN) provides an alternative to the wired or optical LANs. WLAN uses wireless access (Radio Frequency) technology for transmitting and receiving data over the air. It uses the same principle as LANs for transmission of information among the devices attached to the LAN, but with the lack of physical cabling, thus the network can be much more flexible and moving a wireless node is easy. Wireless LANs based on the standard are the most likely candidate to become widespread in corporate environments. Wireless LANs provide flexibility and productivity growth for enterprises, but still they have not been extensively installed due to security concerns. Since mobile applications have special requirements and vulnerabilities against the hackers, therefore security is a critical issue in WLAN. This paper introduces the different technologies for WLAN and also addresses various methods for security in WLAN. Key Words: Flexibility, Hacker, Local Area Network (LAN), Security, Wireless LAN (WLAN) 1. Introduction The concept of Wireless LAN was introduced in mid-1980s. Then 1997, the IEEE approved the international interoperability standard and in 1999, IEEE verified the a and the b wireless networking [1]. Wireless LAN is similar to traditional LAN or Wide Area Network (WAN) which is a flexible data communication system and offers identical access and functionality as a wired LAN. Wirelesses LAN like wired LAN are being developed to provide high bandwidth to users in a limited geographical area [2]. The only difference is that users can access to a LAN or WAN from anywhere that there is a wireless access point. WLAN provides high-speed data communication in small area. It uses one of the transmission techniques; spread spectrum
2 radio, broadcast radio, microwave radio, or infrared light transmission to connect workstation together. [3]. Wireless LANs can be constructed with any of the host of the international networking standards, including IEEE , IEEE a, b, or g (Wi-Fi), Bluetooth, and various European-Specific Standards like HIPERLAN. The term Wi-Fi (Wireless Fidelity) is often used to describe wireless networks. Wi-Fi is easier to say and the popular marketing word, it comes from the testing and certification programs run by the Wi-Fi Alliance. Therefore, products that receive Wi-Fi certification have been tested and found to be interoperable with other certified products [4]. Bluetooth is a very popular Ad hoc network standard. The Bluetooth is a computing and telecommunications industry specification that describes how wireless devices should interconnect with each other. Ad hoc networks enabled by Bluetooth, allow data synchronization with network systems and application sharing between devices [1]. HIPERLAN is ETSI s wireless broadband access standard, which defines the Media Access Control (MAC) sub- layer, the Channel Access Control (CAC) sub-layer and the physical layer. The MAC accesses the physical layer through the CAC, which allows easy adaptation for different physical layers [5]. Any network, including a wired LAN, is subject to considerable security risks as follow: - Threats to the physical security of a network - Unauthorized access and eavesdropping - Authorized attacks from the network s user community Wireless network are more exposed to hackers than wired networks, because a hacker could tap into a network with a laptop and a wireless network card. Also the source and the destination address are not encrypted, even if the data is encrypted. Therefore network security requires continuous review to guarantee that current measures are adequate for safety against new threats. The wireless network standards concentrating on the security functions are HIPERLAN and IEEE HIPERLAN specification defines an encryption decryption scheme for optional use. Large corporate networks generally approach security in three faces [2]: - Creating security policy The security goals are developed based on a list of resources and applications that need to be protected and the type of access a given individual might need to different areas of the network. - Implementing network security
3 Good security is to build layers of barriers that discourage challenges to damage the network and its resources. These layers include the implementation of encryption, passwords and firewalls. Also, we must be very careful to change the default settings that come with the wireless equipment and wireless applications. - Auditing the network The integrity of the network, the policies, tools, and applications that implement security are frequently reviewed to guarantee that the network is not subject to threats. This paper is organized as follows, in section two we introduce the security in wireless network. In section three, we describe the security of wireless LAN. In section four, we conclude our paper. 2. Security in Wireless Network Security is serious problem in all communication systems both for users and providers. Network security refers to the safety of data and recourses from loss, changed, and inappropriate use. Emerging wireless networks share many common characteristics with traditional wired-line networks. Though, the combination of security features into wireless communication must consider restrictions that may apply to their use such as small packet size, low bandwidth, high transmission costs, limited processing, storage recourses and real time constraints. Security risks in wireless LANs are, RF signal limiting, Interference and RF disruption, network detection, and unauthorized network access, Denial of Service, insider threat, compromised devices, illicit access point deployment [6]. The major security problem with wireless networks, generally radio networks, is that they intentionally propagate data over an area that may exceed the limits of the area that the organization physically controls. This problem also exists with wired Ethernet networks, but to a lesser degree. 3. Security in Wireless LAN The IEEE contains several security features [7], such as open system and shared key authentication modes, the Service Set Identifier (SSID), Wired Equivalent Privacy (WEP). Originally, Wireless LAN equipments are distributed with a WEP security mechanism. WEP implement the confidentiality and integrity of the traffic in a network. It has weak key management and weak authentication, and provides a limited level of security. WEP used at the station-to-station level and does not offer any end-to-end security [8]. Therefore, organizations should plan to move to Wi-Fi Protected Access (WPA). Hacker-proofing Techniques are as follow [3]: - Change default parameters, such as SSID and password for administration, when implementing the network. - Enable WEP. - Use the filter capabilities of the access point.
4 - Disable remote access point administration. - Implementing strict password guidelines for the administration of the access point configuration. 3.1 Wired Equivalent Privacy (WEP) Early deployments of Wireless LANs offered no reliable method of authorization and authentication to the network. Wireless LANs are depending on superfluous monitoring. Therefore IEEE specifies an optional MAC layer security system known as Wired Equivalent Privacy (WEP). MAC address lists were implemented with obvious scalability and management issues. WEP is the security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, , it provides a wireless LAN with a level of security and privacy equal to a wired LAN. WEP makes available confidentiality and authentication services to networks. WEP uses shared (symmetric) static keys, which have to be distributed manually to all clients and access points on a network. This shared secret-key to encrypt data at the link-layer (MAC layer) where key size is different for each manufacturer. WEP supports cryptography key size of up to 128 bits [7]. The IEEE defines three basic security services which are provided by WEP [8], these are; - Authentication The WLAN specification for WEP describes two common ways in which a user that is trying to connect to a LAN can be authenticated. - First method uses cryptography which is based on rudimentary cryptographic technique that does not provide mutual authentication. That means, that the client does not authenticate the access point and, therefore, has no way of ensuring it is communicating with an access point. - The second method of authentication does not use cryptography and we disable WEP on the access point. Therefore by using this method, a wireless client can be authenticated through one of the two methods called Open System and Closed System Authentication. - Privacy For privacy or confidentiality WEP uses cryptography techniques. It uses the RC4 symmetric-key, stream cipher algorithm. It uses the 128-bit of WEP option, which must be supported by all Wi-Fi devices. - Integrity The goal of the integrity service is to identify and reject any message that could have been interfered with during transit. This service uses an encrypted Cyclic Redundancy Check (CRC) or Frame Check Sequence (FCS). WEP presents a major cryptography weakness [9] and its disadvantages are as follow: - Station identification relies on hardware addresses that can be easily captured and
5 copied. - Static keys are rarely changed by users. - Keys are duplicated on client stations. - A weak implementation of the RC4 algorithm is used. - An Initialization Vector (IV) sequence is too short and therefore repeats during the timeframe calculation of the key. 3.2 Service Set Identifier (SSID) SSID is another security mechanism, which it is introduced by IEEE b. SSID is a network name that identifies the area covered by one or more access points (APs). In a commonly used mode, the access point (AP) periodically broadcasts its SSID in a signal. A wireless station wishing to associate with AP can listen for these broadcasts and can choose an AP to associate with based upon its SSID [7]. 3.3 Firewalls Firewalls are used as a barrier to keep critical attacks away from the network and provide protection from various kinds of IP spoofing and routing attacks [10]. Firewalls provide a location for monitoring security-related events. They are essential for security of Wireless LAN. Firewalls can be applied as a dedicated hardware/software or completely in software, as in the case in an AP. Firewalls are usually placed at the point of entry to the network or between the segments of the network that need protection. In general, firewalls use one or more of the following three methods to control the flow of traffic in and out of the network [11]. - Packet Filtering Router Filtering rule related to a variety of factors, conditions, and elements of the packets. Common elements for filtering include the following; - IP Address - Domain Names - Protocols - Ports - Content filtering - Proxy Service - State full Inspection Firewalls have their limitations, including the following [10]: - The firewall cannot protect against attacks that bypass the firewall. - The firewall does not protect against internal threats. - The firewall cannot protect against the transfer of virus-infected programs or files. Because of the variety of operating systems and applications supported inside the perimeter, it would be impractical and perhaps impossible for the firewall to scan all incoming files, , and messages for viruses.
6 3.4 Access Control Access Control and authentication are key aspects of a wireless network. It nearly impossible to make a security policy that relay only on WEP for authentication and access control. Thus we need to set supplementary parameters [12]. - Service Set ID (SSID): It is a 32-character-long identifier, which is similar in function to a network identifier and is used to differentiate between wireless LANs. - Access Control List (ACL) sets in most access points. ACL is the technical name for the list of rules to be used for the packet filtering. Conclusions: Wireless LAN is an extension of LAN that uses high frequency radio waves rather than cables and wires to communicate between networking devices. Wireless LAN promises high mobility, and convenience. Also Physical and environmental requirement is the most important factor in using the wireless LAN. In a wired network, the transmission medium can be physically secured, and access to the network is easily controlled. In a wireless network the transmission medium is open to anyone within the geographical range of a transmitter. Therefore the security threats in wireless network are the technology s underlying communications medium, the airwave that causes Wireless LANs are vulnerable to attackers and eavesdropping. Wireless LANs can use all the security features of wired LAN, and also add additional security features for wireless LAN. Therefore IEEE wireless communications have a function called WEP, a form of encryption which provides privacy comparable to that of a traditional wired network. WEP has several weaknesses. Because of the way WEP keys are initialized between the client and access point, WEP keys can be broken very simply, WEP Keys are difficult to manage effectively. They are static and must be distributed to an entire group of users and once distributed they are difficult to change. Also traditional Virtual Private Networking (VPN) techniques will work over wireless networks in the same way as traditional wired networks. Generally data privacy is possible over a radio medium using encryption. But it causes encryption of wireless traffic. Therefore, it generally reduces performance and increases the cost. References: [1] T. Karygiannis, L. Owens, Wireless Network Security , Bluetooth and Handheld Devices, National Institute of Standards and Technology (NIST), November [2] B.P.Crow, I.Widjaja, J.G. Kim, P.T.Sakai, IEEE Wireless Local Area Networks, IEEE Communication Magazine, Sep [3] D.C.Yen, D.C.Chou, Wireless Communication: the Next Wave of Internet Technology, Technology In Society, [4] Becta Technical paper, Wireless Local Area Networks (WLAN), [5] ETS , High Performance Radio Local Area Network (HIPERLAN) Type1; Functional specification, ETSI, 1996.
7 [6] K. Pahlavan, A. Zahedi, P. Krishnamurthy, Evolving Wireless LAN Industry - Products and Standards. Invited paper PIMRC 97, Worcester Polytechnic Institute, [7] J. S. King, An IEEE Wireless LAN Security, October 22, [8] S. Uskela, Security in Wireless Local Area Networks, Helsinki University of Technology, [9] Wireless Local Area Network, [10] W. Stallings, Cryptography and Network Security Principles and Practices, Third Edition, Prentice Hall, New Jersey, pp , [11] J. Chen, T. Zhang, IP- Based Next- Generation Wireless networks, Wiley, [12] R.D. Vines, Wireless Security Essentials, Wiley, 2002.
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/
Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures
Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures (IEEE 802.11 Wireless Networks) James Burrell Research project submission for the partial fulfillment of the requirements for
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Wireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal 1,2 Department of CSE 1,2,3 BRCM Bahal, Bhiwani 1 [email protected], 2 [email protected] Abstract This paper
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING
International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Network Security Best Practices
CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Understand VLANs, Wired LANs, and Wireless LANs
LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Particularities of security design for wireless networks in small and medium business (SMB)
Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, [email protected]
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. Dan Farmer, System Administrators Guide to Cracking
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
Chapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What
XX-XXX Wireless Local Area Network Guidelines. Date: August 13, 2003 Date Adopted by NITC: Other:
Nebraska Information Technology Commission TECHNICAL STANDARDS AND GUIDELINES Wireless Local Area Network Guidelines Category Title Number Security Architecture Wireless Local Area Network Guidelines Applicability
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123
THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 CONFIGURING YOUR HOME WIRELESS NETWORK Presented by: Mr. Eric Fan, Chairman, PISA Knowledge 123 Firmware 軟 韌 體 Knowledge 123 Home Network Functions
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
WIRELESS NETWORKING SECURITY
WIRELESS NETWORKING SECURITY Dec 2010 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
Wireless Local Area. Network Security
Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
ENHWI-N3. 802.11n Wireless Router
ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
Access Point Configuration
Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Top 10 Security Checklist for SOHO Wireless LANs
Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
Firewalls (IPTABLES)
Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story
Wireless s June September 00 Agenda Wireless Security ผศ. ดร. อน นต ผลเพ ม Asst. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University,
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2) Vipin Poddar Suresh Gyan Vihar School of Engginering And Technology, Jaipur, Rajasthan. Hitesh Choudhary, Poornima University, Jaipur,
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
Wireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2) Disha Baba Banda Singh Bahadur Engineering College Fatehgarh Sahib, Punjab Sukhwinder Sharma Baba Banda Singh Bahadur Engineering College Fatehgarh
Legacy 802.11 Security
Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol
Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
