Wireless LAN Security: Securing Your Access Point
|
|
|
- Norma Hancock
- 9 years ago
- Views:
Transcription
1 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty of Information Science and Technology Multimedia University, Malaysia Abstract Wireless Local Area Network (WLAN) is vulnerable to attacks due to the use of radio frequency, which encounters data revelation. This paper describes about wireless security in the physical layer, dealing namely with Access Points (AP). It is recommended to secure wireless LANs with a layered approach. Where best to begin securing the network than starting with the physical layer? 1. Introduction Wireless networks are totally different to wired networks, which can be physically secured. The information goes through the air, where anyone can transmit and anyone can receive. Signals are not guided by wires. WLANs are therefore essentially vulnerable to interception. The standard covers wireless networks. This classification actually comes from Institute of Electrical and Electronics Engineers (IEEE) where they create standards, and they number these standards in unique ways. The standard had two primary goals when it was initially written:- 1) ease of accessibility 2) connection In other words, the was developed as an open standard. Bear in mind, when security is not engineered into a solution during the initial stages, the security solutions have historically been less than optimal. There are currently a lot of worries about wireless security. Standard networks at home or at work are based on physical connectivity. With wireless there is no physical connection. Wireless access points are really radio transmitters. They use radio waves that can go through walls and buildings. This makes connecting to a local network in your home or place of employment very versatile. The downside is that connecting to your network as an intruder is a lot easier. Security considerations now have to be taken to prevent unauthorized access to your network and data. Section 2 will describe the theoretical background of WLAN. To start securing wireless network, there are four elements that need to be addressed. Section 3 and 4 will illustrate the MAC address filtering and AP. While, Section 5 and 6 will talk about Service Set Identifier (SSID) parameter and Wired Equivalent Privacy (WEP). 2. Background The most prominent feature about WLAN is the absence of wires and its mobility. However, as data traveled through air using radio frequency, it can easily be tapped by any one including unauthenticated personnel using a sniffer. [5] Not paying much attention to the security of your wireless network is not a wise thing to do, designing a network with security in mind from the very beginning saves you time, effort, and perhaps money. Prevention during primary stages is always the best solution. It does not mean that some organizations do not need to worry about wireless security if their wireless LAN deployment was not too significant. At some point, most connect with the main organization s backbone. It is possible for hackers to use the wireless LAN as a launch pad to the entire network. To achieve complete security in wireless network seems a near impossible task. Therefore adequate deterrence should be suggested instead while designing a wireless network. In this case it means that we need to take a hard look at the access point. The access point would be the first to look into for setting up a good secured wireless network.
2 174 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 Currently, there are many kinds of AP in market. An example of a decent and reasonably priced access point is the Linksys IEEE WRT54G. To protect your data and privacy, the Wireless-G Access Point can encrypt all wireless transmissions, and supports the industrialstrength security of Wi-Fi Protected Access (WPA). The MAC Address filter lets you decide exactly who has access to your wireless network. Another interesting feature about Linksys is its ability for firm-ware updates. The ability to update firmware is beneficial because functions can be added for the access point, or if bugs do occur, the company will come up with solutions to fix the firmware. 3. MAC Address Filtering Every device that connects to a network has a unique hardware address called a MAC address (Media Access Control). This address is a 48-bit address expressed as 12 hexadecimal digits. This 12 digit hex number can be broken down even further into two fields. The first part of the MAC is a 24 bit vendor code. This identifies what vendor has made this particular network device. The last 24 bits in the MAC address is the serial number of the network interface card. [7] So, we can identify our Access Points by the SSID, but how can we uniquely identify our wireless clients. We can identify them by their unique MAC address. So, by creating a list of unique MAC addresses we can restrict what PCs can connect to the AP. This is called MAC address filtering. If a PC with an unknown MAC address tries to connect, he will not be able to associate with the AP and thus will not be allowed to connect. This feature along with the previous SSID lockdown provides a great way to start securing your wireless network. The below screenshot of the Kismet interface lists the different wireless networks that were detected by the online target laptop. SSIDs that act as crude passwords and MAC addresses that act as personal identification numbers are often used to verify that clients are authorized to connect with an access point. Because existing encryption standards are not foolproof, knowledgeable intruders can pick off authorized SSIDs and MAC addresses to connect to a wireless LAN as an authorized user with the ability to steal bandwidth, corrupt or download files, and wreak havoc on the entire network. Figure 1. Kismet Interface List
3 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May The network list in Figure 1 states whether the network SSID is WEP enabled or not (the W section). If the network was WEP enabled, it would state with a Y and if it wasn t an N will be stated instead. The Ch section notes which channels the networks were connected on. Kismet was able to detect networks that are broadcasting the SSID and those that are not, as revealed in the status section. As Kismet works passively, it does not send any loggable packets. It detects wireless APs and wireless clients, and associates them to each other. As shown in the Figure 2, Kismet was able to reveal all the MAC addresses associated to the network. WRT54G is actually able to filter MAC addresses. Unfortunately, MAC filtering is trivial to bypass. The network traffic can be sniffed to determine which MAC addresses are present. MAC addresses can be changed after sniffing too. To prove whether the AP includes Linksys IEEE WRT54G is actually able to offer the security it features, we have acquired the Auditor Security Collection that can be downloaded from It provides a complete suite of wireless network discovery and penetration test tools. Included in this suite is Kismet, an wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff b, a, and g traffic. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and inferring the presence of nonbeaconing networks via data traffic. [1] Figure 2. Kismet reveal address associated to the network
4 176 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 The Figure 3 below actually shows that Kismet offers the option to change MAC addresses. Many enterprises and universities secure their wireless LAN with authentication based on an authorized list of MAC addresses, such as currently deployed by Multimedia University (MMU) Malaysia. While this provides a low level of security for smaller deployments, MAC addresses were never intended to be used in this manner. As shown below, Kismet allows hackers to assume the identity of an authorized user by inserting the stolen MAC address as his own. The hacker then connects to the wireless LAN as an authorized user. However, Linkys was actually able to filter the MAC addresses. Figure 3. Kismet Auditor Security Collection: Change MAC Address
5 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May Access Point (AP) To secure wireless network, a very important factor is the choice of a good AP. The AP would be the first to look into for setting up a good secured wireless network. First thing to be considered is the physical walkthrough, the signal strength and access point placement. For the physical walkthrough, things that need to be considered is the metal objects, open distances, building construction, window glass and all the material that can effect the signal strength. The second component is access point; it is better to name access point properly so that it can be tracked down easily during trouble shooting event. Access point must be installed in a potential service location where it is a common place for users to reach. If access point is installed outdoors, make sure the equipment is properly secured, discouraging tampering. Figure 4 below shows a multiplicity of certain network. The attacker creates an access point, which has the same name as the original wireless network. The fake access point could be stronger or have greater signal should the attacker was able to be closer to its target. Usually stations would automatically select access points, which are greater; therefore the target may confuse and select the attacker s fake access point by mistake. A fake access point or more commonly known as a rogue access point is one that the organization having a wireless network does not authorize for operation. Linksys WRT54G is unable to prevent rogue access point. The AP is secure if packets move slowly as shown in the following Figure 5. This means that Linksys WRT54G prevents replay attacks. Replay is an active attack on integrity where an intruding party resends information that is sent from the source entity to the destination entity. Replay attacks can be used to crack WEP as well. Figure 4. Kismet Network List (Autofit): No weak IVs
6 178 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 Figure 5. Linksys WRT54G: Prevent reply attack 5. Service Set Identifier (SSID) The SSID is the first parameter that gets talked about when wireless LAN security is discussed. This is a 1 to 32 alphanumeric character string that is used to identify membership to an access point (AP) in a wireless local area network (WLAN). [6] The beacon frame, which is a type of management frame, provides the "heartbeat" of a wireless LAN, enabling stations to establish and maintain communications in an orderly fashion. [3] When a device transmits a beacon frame, which can occur several times per second, it is advertising itself to the world in hopes of finding something else to communicate with. When a device receives a beacon frame, it has all the information it needs to communicate with the transmitting device; namely, the SSID. These frames were captured using Ethereal s network packet analyzer which can be downloaded from By sniffing a beacon frame, one can find the SSID information as shown in the Figure 6. SSID information can be filtered by some APs. Linksys WRT54G provides the option of enabling/disabling SSID broadcasts. This can act as some kind of password to the wireless network, therefore filtering SSID can be considered as a type of password. A good SSID would not have a name that is related to that organization. Another good example is an unnamed SSID, anonymity is better as shown in the following Figure 7.
7 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May Figure 6. Ethereal: Network packet analyzer Figure 7. Unnamed SSID
8 180 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May Wired Equivalent Privacy (WEP) Wired Equivalent Privacy (WEP) is the privacy protocol specified in IEEE to provide wireless LAN users protection against casual eavesdropping. [2] Among the features of WEP are: Uses stream cipher RC4 for confidentiality Uses CRC-32 checksum for integrity Has 2 Key sizes: 40 bit and 104 bit + (24 bit) IV The same traffic key must never be used twice To attack WEP, the authentication key will be sniffed by the attacker, and replay attack will be conducted to collect interesting initialization vectors (IVs) that will help to crack the WEP. The above Figure 8 shows that Linksys is able to withstand an attack on WEP as there were insufficient IVs that could be collected from the particular network. While, as stated in the following Figure 4, there were no weak IVs available in the network for collection to crack WEP (Weak: 0). Even if they are protected by WEP (which still remains the most common security counter measure on LANs), the vulnerabilities of WEP are very well publicized and known to practically anyone with a minimal interest in wireless networking. Figure 8. Kismet Network List (SSID): Insufficient IVs
9 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May Conclusion As previously stated before, it is suggested to secure wireless LANs with a layered approach, beginning with the physical layer. The importance of Layer 1 security should not be taken too lightly. Good access points are a main factor to achieve decent security for the wireless network. We do not need expensive, high-end access points to stay secure, decently priced ones are usually adequate. Simple defensive methodologies should always be taken account into, such as SSID and protocol filtering. Nonetheless, it is still important to continue implementing the correct methods for the other layers in the network to achieve the most secure and optimal wireless network. References [1] Kismet. [2] Wireless LAN Security Interoperability Lab: What s Wrong With WEP?. wrong_with_wep-lv03.pdf [3] Jim Geier Beacons Revealed. [4] Remote-exploit.org. [5] Wen Chuan Hsieh, Chi Chun Lo, Jing Chi Lee & Li Tsung Huang, The Implementation of a Proactive Wireless Intrusion Detection System, IEEE [6] Joe Scolamiero, Securing Your Wireless Access Point: What Do All Those Settings Mean Anyways, SANS Institute [7] Cisco System Press, edited by Laura Chappell, Introduction to Cisco Router Configuration, Macmillan Technical Publishing, 1999
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Chapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
Access Point Configuration
Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give
Top 10 Security Checklist for SOHO Wireless LANs
Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
Network Security Best Practices
CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. Dan Farmer, System Administrators Guide to Cracking
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
WIRELESS NETWORKING SECURITY
WIRELESS NETWORKING SECURITY Dec 2010 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)
COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2) Disha Baba Banda Singh Bahadur Engineering College Fatehgarh Sahib, Punjab Sukhwinder Sharma Baba Banda Singh Bahadur Engineering College Fatehgarh
m-trilogix White Paper on Security in Wireless Networks
m-trilogix White Paper on Security in Wireless Networks Executive Summary Wireless local area networks (WLANs) based on IEEE 802.11b (Wi-Fi) will ship, according to a Cahners- Instat study, 23.6 million
THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING
International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. E-mail: [email protected] Dez 2009. Dez 2009 1
SSI Commons Wireless Protocols WEP and WPA2 Bertil Maria Pires Marques E-mail: [email protected] Dez 2009 Dez 2009 1 WEP -Wired Equivalent Privacy WEPisasecurityprotocol,specifiedintheIEEEWireless Fidelity
WLAN Security Networking with Confidence
WLAN Security Networking with Confidence Introduction So you ve just installed a new wireless local area network (WLAN) in your small business or home. The access point is on and connected, the client
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)
A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2) Vipin Poddar Suresh Gyan Vihar School of Engginering And Technology, Jaipur, Rajasthan. Hitesh Choudhary, Poornima University, Jaipur,
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
Wireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Configuring Your Network s Security
Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible
Securing your Linksys WRT54G
Securing your Linksys WRT54G Abstract Current implementations of the 802.11b and 802.11g wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms in these
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007
Wireless Network Security Pat Wilbur Wireless Networks March 30, 2007 Types of Attacks Intrusion gain unauthorized access to a network in order to use the network or Internet connection Types of Attacks
Ralink Utility User Guide/PC/MAC
/PC/MAC Connecting through Ralink Utility Before you can access the Ralink Utility, please connect the Powerlink USB adapter to your computer, and disable your previous WiFi adapter which is built-in on
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 5, May 2015, 23-30 Impact Journals WI-FI SECURITY: A LITERATURE
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Securing your Linksys Wireless Router BEFW11S4 Abstract
Securing your Linksys Wireless Router BEFW11S4 Abstract Current implementations of the 802.11b wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
Configure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Methodology: Security plan for wireless networks. By: Stephen Blair Mandeville A. Summary
Methodology: Security plan for wireless networks By: Stephen Blair Mandeville A. Summary The evolution to wireless networks allows connections with the same quality of data transfer at a lower cost but
Wireless Security for Mobile Computers
A Datalogic Mobile and Summit Data Communications White Paper Original Version: June 2008 Update: March 2009 Protecting Confidential and Sensitive Information It is every retailer s nightmare: An attacker
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Configuration. Windows 98 and Me Configuration
Configuration Windows 98 and Me Configuration Installing the TCP/IP Protocol Windows 2000 Configuration Windows XP Configuration Wireless Configuration 128-Bit Encryption Wireless Security in Windows XP
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK ABSTRACT Dr. Sanjeev Dhull Associate Professor, RPIIT Karnal, Dept of Computer Science The DoS attack is the most
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
Link Link sys E3000 sys RE1000
User Guide High Performance Extender Wireless-N Router Linksys Linksys RE1000 E3000Wireless-N Table of Contents Contents Chapter 1: Product Overview 1 Front 1 Top 1 Bottom 1 Back 2 Chapter 2: Advanced
Wireless LAN Security I: WEP Overview and Tools
Wireless LAN Security I: WEP Overview and Tools Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-09/
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
WIRELESS SECURITY TOOLS
WIRELESS SECURITY TOOLS Johanna Janse van Rensburg, Barry Irwin Rhodes University [email protected], [email protected] (083) 944 3924 Computer Science Department, Hamilton Building, Rhodes University
NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2
BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
USER GUIDE Cisco Small Business
USER GUIDE Cisco Small Business WBPN Wireless-N Bridge for Phone Adapters December 2011 Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries.
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal
Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal 1,2 Department of CSE 1,2,3 BRCM Bahal, Bhiwani 1 [email protected], 2 [email protected] Abstract This paper
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
ALL1682511. 500Mbits Powerline WLAN N Access Point. User s Manual
ALL1682511 500Mbits Powerline WLAN N Access Point User s Manual Contents 1. Introduction...1 2. System Requirements...1 3. Configuration...1 4. WPS...9 5. Wireless AP Settings...9 6. FAQ... 15 7. Glossary...
Wireless Intrusion Detection Systems (WIDS)
Systems (WIDS) Dragan Pleskonjic CONWEX [email protected] [email protected] Motivation & idea Wireless networks are forecasted to expand rapidly (Wi-Fi IEEE 802.11a/b/g ) WLANs offer
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
WLAN and IEEE 802.11 Security
WLAN and IEEE 802.11 Security Agenda Intro to WLAN Security mechanisms in IEEE 802.11 Attacks on 802.11 Summary Wireless LAN Technologies WLAN technologies are becoming increasingly popular, and promise
Figure 1. The Motorola SB4200 cable modem
Setting Up a Home Wireless Network What You Need If you're still using a dial-up modem to access the Internet, it's time to consider broadband. Depending on where you live, you can either opt for a cable
Guide for wireless environments
Sanako Study Guide for wireless environments 1 Contents Sanako Study... 1 Guide for wireless environments... 1 What will you find in this guide?... 3 General... 3 Disclaimer... 3 Requirements in brief...
Running Head: WIRELESS NETWORKING FOR SMALL BUSINESSES. Wireless Networking for Small Businesses. Russell Morgan. East Carolina University
Wireless Networking for Small Businesses 1 Running Head: WIRELESS NETWORKING FOR SMALL BUSINESSES Wireless Networking for Small Businesses Russell Morgan East Carolina University Wireless Networking for
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
