THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING



Similar documents
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Security in Wireless Local Area Network

9 Simple steps to secure your Wi-Fi Network.

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

The next generation of knowledge and expertise Wireless Security Basics


Particularities of security design for wireless networks in small and medium business (SMB)

Industrial Communication. Securing Industrial Wireless

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

How To Secure Wireless Networks

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Security Awareness. Wireless Network Security

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Link Layer and Network Layer Security for Wireless Networks

chap18.wireless Network Security

Chapter 2 Wireless Networking Basics

Recommended Wireless Local Area Network Architecture

WIRELESS NETWORKING SECURITY

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Wireless Security for Mobile Computers

Network Security Best Practices

Wireless Network Standard and Guidelines

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

Wireless Networks. Welcome to Wireless

Wireless Network Security

The Importance of Wireless Security

WIRELESS SECURITY IN (WI-FI ) NETWORKS

Wireless Encryption Protection

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Chapter 3 Safeguarding Your Network

Chapter 2 Configuring Your Wireless Network and Security Settings

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

CS 356 Lecture 29 Wireless Security. Spring 2013

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

WIRELESS NETWORK SECURITY

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

WiFi Security Assessments

WLAN Security Networking with Confidence

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

Topics in Network Security

United States Trustee Program s Wireless LAN Security Checklist

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Running Head: WIRELESS NETWORKING FOR SMALL BUSINESSES. Wireless Networking for Small Businesses. Russell Morgan. East Carolina University

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

A Division of Cisco Systems, Inc. GHz g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

Ensuring HIPAA Compliance in Healthcare

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

WIRELESS NETWORKING NETWORK SETUP & CONFIGURATION. W i r e l e s s N e t w o r k i n g - P a g e 1

Configuring Security Solutions

Network Access Security. Lesson 10

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

Your Wireless Network has No Clothes

Go Wireless. Open up new possibilities for work and play

CS549: Cryptography and Network Security

Wireless Security with Cyberoam

Wi-Fi Client Device Security and Compliance with PCI DSS

How To Protect A Wireless Lan From A Rogue Access Point

MN-700 Base Station Configuration Guide

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Using Wireless Technology Securely

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

Top 10 Security Checklist for SOHO Wireless LANs

Link Layer and Network Layer Security for Wireless Networks

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Developing Network Security Strategies

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University

Best Practices for Deploying Wireless LANs

Cornerstones of Security

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Remote Access Security

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Chapter 2 Wireless Settings and Security

Wireless LAN Security: Securing Your Access Point

Security in IEEE WLANs

Transcription:

International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9 ISSN Print: 0976-6464 and ISSN Online: 0976-6472 IAEME Publication THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING Modesta. E. Ezema Lecturer 1 Department of Computer Science, University of Nigeria, Nsukka Enugu State, Nigeria Chidera.C. Ezema Department of Electrical Electronics Engineering, Enugu State University of Science and Technology, ESUT Enugu State, Nigeria Asumpta Uju Ezugwu Department of Computer Science, University of Nigeria, Nsukka, Enugu State, Nigeria ABSTRACT The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, that no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. The goal of this paper is to present a framework to help managers understand the various threats associated with the use of wireless technology, disadvantages and threats of the wireless security protocols. WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) Security protocols are examined in this respect. Then they are compared via the common features in order to give some insight to those who work with WLANs. I hope this paper give boost to the IT security personnel and clarify the common questions of the nonspecialist reader. Key word: Cryptography, Encryption, Security, Enciphering, Deciphering, Cryptosystem, Cryptanalysis http://www.iaeme.com/ijecet/index.asp 65 editor@iaeme.com

Modesta. E. Ezema, Chidera.C. Ezema and Asumpta Uju Ezugwu Cite this Article: Modesta. E. Ezema, Chidera.C. Ezema and Asumpta Uju Ezugwu. The Importance of Cryptography Standard In Wireless Local Area Networking, International Journal of Electronics and Communication Engineering & Technology, 6(9), 2015, pp. 65-74. http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=6&itype= 9 1. INTRODUCTION As the Internet and the World Wide Web have exploded into our culture and are replacing other media forms for people to find news, weather news, sports, recipes, and a million other things, the new struggle is not only for time on the computer at home, but for time on the Internet connection. The hardware and software vendors have come forth with a variety of solutions allowing home users to share one Internet connection among two or more computers. They all have one thing in common though- the computers must somehow be networked.[1] To connect your computers together has traditionally involved having some physical medium running between them. It could be phone, wire, coaxial cable or the ubiquitous CAT5 cable. Recently hardware has been introduced that even lets home users network computers through the electrical wiring. But, one of the easiest ways to network computers throughout your home is to use wireless technology. It is a fairly simple setup. The Internet Service Provider comes in from of your provider and is connected to a wireless access point or router which broadcasts the signal. You connect wireless antenna network cards to your computers to receive that signal and talk back to the wireless access point. The problem with having the signal broadcast is that it is difficult to contain where that signal may travel. [2] The great flexibility of Transmission Control Protocol/Internet Protocol (TCP/IP) has led to its worldwide acceptance as the basic Internet and intranet communications protocol. At the same time, the fact that Transmission Control Protocol/Internet Protocol (TCP/IP) allows information to pass through intermediate computers makes it possible for a third party to interfere with communications in the following ways: Eavesdropping. Information remains intact, but its privacy is compromised. For example, someone could learn your credit card number, record a sensitive conversation, or intercept classified information. Tampering. Information in transit is changed or replaced and then sent on to the recipient. For example, someone could alter an order for goods or change a person's resume. Impersonation. Information passes to a person who poses as the intended recipient. Impersonation can take two forms: Spoofing. A person can pretend to be someone else. For example, a person can pretend to have the email address jdoe@example.net, or a computer can identify itself as a site called www.example.net when it is not. This type of impersonation is known as spoofing. Misrepresentation. A person or organization can misrepresent itself. For example, suppose the site www.example.net pretends to be a furniture store when it is really just a site that takes credit-card payments but never sends any goods. Denial of Service: In this kind of attack, the intruder floods the network with either valid or invalid messages affecting the availability of the network resources. http://www.iaeme.com/ijecet/index.asp 66 editor@iaeme.com

The Importance of Cryptography Standard In Wireless Local Area Networking Evil Twin attack: The installation of an extra wireless access point posing as a legitimate organisation-owned access point. If legitimate clients attempt to associate with the rogue access point, the malicious user could steal or capture any authentication credentials utilized. Due to the nature of the radio transmission, the WLAN are very vulnerable against denial of service attacks. The relatively low bit rates of WLAN can easily be overwhelmed and leave them open to denial of service attacks [3]. By using a powerful enough transceiver, radio interference can easily be generated that would enable WLAN to communicate using radio path. Normally, users of the many cooperating computers that make up the Internet or other networks do not monitor or interfere with the network traffic that continuously passes through their machines. However, many sensitive personal and business communications over the Internet require precautions that address the threats listed above. Fortunately, a set of wellestablished techniques and standards known as public-key cryptography make it relatively easy to take such precautions. Cryptographic technique is a promising way to protect our files against unauthorized access. Nowadays people have developed so many useful cryptographic algorithms, from old DES (Data Encryption Standard) to recent IDEA (International Data Encryption Algorithm), AES (Advanced Encryption Standard) and etc. Some user-level tools (e.g. crypt program) based on these strong and speedy algorithms have come out to help users do the encryption and decryption routines, but they are not so convenient, not well integrated with the whole system and sometimes may be vulnerable to non-crypto analytic system level 2. COMPUTER SECURITY AND ITS ROLE One broad definition of a secure computer system is one that can be depended upon to behave as it is expected. It is always a point of benefit to integrate security with dependability and how to obtain a dependable computing system. [4] Dependability is the trustworthiness of a system and can be seen as the quality of the service a system offers. Integrating security and dependability can be done in various ways. One approach is to treat security as one characteristic of dependability on the same level as availability, reliability and safety as shown in the figure. Dependability Availability Reliability Safety Security Figure 1 characteristics of a secured system A narrower definition of security is the possibility for a system to protect objects with respect to confidentiality, authentication, integrity and non-repudiation. Confidentiality: Transforming data such that only authorized parties can decode it. Authentication: Proving or disproving someone s or something s claimed identity. http://www.iaeme.com/ijecet/index.asp 67 editor@iaeme.com

Modesta. E. Ezema, Chidera.C. Ezema and Asumpta Uju Ezugwu 3. HARDWARE REQUIREMENTS FOR LOCAL AREA NETWORK The kind of hardware you would need to setup a wireless network depends on what the scale of the network will be. However you will almost certainly always need an access point and a wireless network interface card. If you want to setup a temporary network between two computers then two wireless Network Interface Card are enough. If you wish to share a broadband internet connection then speeds of a 512k and above are required. Lower bandwidth will work but only result in slower or unacceptable performance. 3.1. Access Point This piece of hardware acts as a bridge between the wired network and wireless devices. It allows multiple devices to connect through it to gain access to the network. An Access Point can also act as a router; a means by which the data transmission can be extended and passed from one access point to another. 3.2. Wireless Network Card A wireless network card is required on each device on a wireless network. A laptop usually has an expansion slot where the network card would fit in. A desktop computer would need an internal card which will usually have a small antenna or an external antenna on it. These antenna are optional on most equipment and they help to increase the signal on the card. Fig. 2: an example of a wireless network interface card (NIC) 4. WIRELESS NETWORK SETUP We have different types of wireless network types. These will be explained below. http://www.iaeme.com/ijecet/index.asp 68 editor@iaeme.com

The Importance of Cryptography Standard In Wireless Local Area Networking Figure 4 wireless network setup 4.1. Infrastructure [5] In the case of wireless networking in Infrastructure mode you are connecting your devices using a central device, namely a wireless access point. To join the WLAN, the AP and all wireless clients must be configured to use the same SSID. The AP is then cabled to the wired network to allow wireless clients access to, for example, Internet connections or printers. It is also referred to as a hosted or managed wireless network it consists of one or more access points (known as gateways or wireless routers) being connected to an existed network. Additional APs can be added to the WLAN to increase the reach of the infrastructure and support any number of wireless clients. In this case, infrastructure refers to switches, routers, firewalls, and access points (APs). Infrastructure mode wireless networking is the mode that you most often encounter in your work as a networking professional supporting networks for clients or in a corporate environment. Figure 5 infrastructure network 4.2. Ad-Hoc Also referred to as an unmanaged or peer to peer wireless network it consists of each device connecting directly to each other. This will allow someone sitting outside in the garden with a laptop to communicate with his desktop computer in the house and access the Internet, for example. http://www.iaeme.com/ijecet/index.asp 69 editor@iaeme.com

Modesta. E. Ezema, Chidera.C. Ezema and Asumpta Uju Ezugwu Figure 6 Ad hoc wireless network [6] Ad hoc networks are by definition temporary; they cease to exist when members disconnect from them, or when the computer from which the network was established moves beyond the 30-foot effective range of the others. You can share an Internet connection through an ad hoc network, but keep in mind that the Internet connection is then available to anyone logging on to a computer that is connected to the network, and thus is likely not very secure. 5. METHODS OF WIRELESS NETWORKING SECURITY The WEP, SSID and MAC Address filtering as three methods of wireless networking security. Here we will get to know a little more about these and what other methods of security are available. 5.1. WEP (Wired Equivalent Privacy) [7] Wired Equivalent Privacy (WEP) is a security protocol for wireless networks that encrypts transmitted data. Developed in the late 1990s, WEP is a basic protocol that is sometimes overlooked by wireless administrators because of its numerous vulnerabilities. The original implementations of WEP used 64-bit encryption (40-bit + 24-bit Initialization Vector). By means of a Brute Force attack, 64-bit WEP can be broken in a matter of minutes, whereas the stronger 128-bit version will take hours. It s not the best line of defense against unauthorized intruders but better than nothing and mainly used by the average home user. One of the drawbacks of WEP is that since it uses a shared key, if someone leaves the company then the key will have to be changed on the access point and all client machines. WEP, a data privacy encryption for WLANs defined in 802.11b, didn't live up to its name. Its use of rarely changed, static client keys for access control made WEP cryptographically weak. Cryptographic attacks allowed attackers to view all data passed to and from the access point. WEP's weaknesses include the following: Static keys that are rarely changed by users. A weak implementation of the RC4 algorithm is used. An Initial Vector sequence is too short and "wraps around" in a short time, resulting in repeated keys. http://www.iaeme.com/ijecet/index.asp 70 editor@iaeme.com

The Importance of Cryptography Standard In Wireless Local Area Networking 5.2. WEP2 (Wired Equivalent Privacy version 2) [8] In an attempt to increase protection, these encryption methods were extended to support longer keys including 104-bit (128 bits of total data), 152-bit and 256-bit. When communicating over a Wi-Fi connection, the protocol encrypts the data stream using these keys so that it is no longer human readable but still can be processed by receiving devices. The keys themselves are not sent over the network but rather are generally stored on the wireless network adapter or in the Windows Registry In 2004, the IEEE proposed an updated version of WEP; WEP2 to address its predecessor s shortcomings. Like WEP it relies on the RC4 algorithm but instead uses a 128-bit initialization vector making it stronger than the original version of WEP, but may still be susceptible to the same kind of attacks. 5.3. WPA (Wi-Fi Protected Access) WPA provides encryption via the Temporary Key Integrity Protocol (TKIP) using the RC4 algorithm. [9] WPA is a security technology for Wi-Fi wireless computer networks. WPA improves on the authentication and encryption features of WEP (Wired Equivalent Privacy). In fact, WPA was developed by the networking industry in response to the weaknesses of WEP. WPA provides stronger encryption than WEP through use of either of two standard technologies: Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). WPA also includes built-in authentication support that WEP does not offer. Overall, WPA provides comparable security to VPN tunneling with WEP, with the benefit of easier administration and use. It is based on the 802.1X protocol and addresses the weaknesses of WEP by providing enhancements such as Per-Packet key construction and distribution, a message integrity code feature and a stronger IV (Initialization Vector). The downside of WPA is that unless your current hardware supports WPA by means of a firmware upgrade, you will most likely have to purchase new hardware to enjoy the benefits of this security method. The length of a WPA key is between 8 and 63 characters the longer it is the more secure it is. 5.4. WPA2 (Wi-Fi Protected Access version 2) Based on the 802.11i standard, WPA2 was released in 2004 and uses a stronger method of encryption AES (Advanced Encryption Standard). AES supports key sizes of 128 bits, 192 bits, and 256 bits. It is backward compatible with WPA and uses a fresh set of keys for every session, so essentially every packet that sent over the air is encrypted with a unique key. As did WPA, WPA2 offers two versions Personal and Enterprise. Personal mode requires only an access point and uses a pre-shared key for authentication and Enterprise mode requires a RADIUS authentication server and uses RADIUS authentication server and uses Extensible Authentication Protocol (EAP) 5.5. MAC Address Filtering MAC Address Filtering is a means of controlling which network adapters have access to the access point. [10] A MAC (Media Access Control) address is a number that identifies the network adapter(s) installed on your computer. The address is composed of up to 6 pairs of characters, separated by colons. You may need to provide your MAC address to a router in order to successfully connect to a network. A list of MAC Addresses are entered into the access point and anyone whose MAC address on the wireless network adapter does not match an entry in the list will not be allowed to http://www.iaeme.com/ijecet/index.asp 71 editor@iaeme.com

Modesta. E. Ezema, Chidera.C. Ezema and Asumpta Uju Ezugwu have access. This is a good means of security when also used with a packet encryption method. However, keep in mind that MAC addresses can be spoofed. This type of security is usually used as a means of authentication, in conjunction with something like WEP for encryption. Below is a basic image demonstrating the MAC Address Filtering process: In a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet address.) When you're connected to the Internet from your computer (or host as the Internet protocol thinks of it), a correspondence table relates your IP address to your computer's physical (MAC) address on the LAN Figure 7 a laptop in a local Area network showing its MAC address A laptop, with MAC Address 00-0F-CA-AE-C6-A5 wants to access the wireless network via the access point. The access point compares this Address to its list and permits or denies access accordingly. 5.6. SSID (Service Set Identifier) An SSID, or Network Name, is a secret name given to a wireless network.[11] An SSID is the name of a wireless local area network (WLAN). All wireless devices on a WLAN must employ the same SSID in order to communicate with each other. I put secret in inverted commas because it can be sniffed pretty easily. By default, the SSID is a part of every packet that travels over the WLAN. Unless you know the SSID of a wireless network you cannot join it. Every network node must be configured with the same SSID of the access point that it wishes to connect, which becomes a bit of a headache for the network administrator. 5.7 VPN (Virtual Private Network) Link Perhaps the most reliable form of security would be to setup a VPN connection over the wireless network. VPNs have for long been a trusted method of accessing the corporate network over the internet by forming a secure tunnel from the client to the server. Setting up a VPN may affect performance due to the amount of data encryption involved but your mind will be at rest knowing your data is secure. The VPN option is preferred by many enterprise administrators because VPNs offer the best commercially available encryption. VPN software uses advanced encryption mechanisms (AES for example), which makes decrypting the traffic very hard, if not impossible, task. http://www.iaeme.com/ijecet/index.asp 72 editor@iaeme.com

The Importance of Cryptography Standard In Wireless Local Area Networking For a clearer understanding of the VPN link method, see fig 8 below. Figure 8 virtual private Network connections There are various levels of VPN technology, some of which are expensive and include both hardware and software. Microsoft does however provide us with a basic VPN technology commonly used in small to medium enterprise networks - Windows 2000 Advanced Server and Windows Server 2003. These are more than capable of handling your wireless VPN requirements. 5.8. 802.1X [12] Today WLANs are maturing and producing security innovations and standards that will be used across all networking mediums for years to come. They have learned to harness flexibility, creating solutions that can be quickly modified if weaknesses are found. An example of this is the addition of 802.1x authentication to the WLAN security toolbox. It has provided a method to protect the network behind the access point from intruders as well as provide for dynamic keys and strengthen WLAN encryption. With 802.1X the authentication stage is done via a RADIUS server (IAS on Windows Server 2003) where the user credentials are checked against the server. When a user first attempts to connect to the network they are asked to enter their username and password. These are checked with the RADIUS server and access is granted accordingly. Every user has a unique key that is changed regularly to allow for better security. Hackers can crack codes but it does take time, and with a new code being generated automatically every few minutes, by the time the hacker cracks the code it would have expired. 802.1X is essentially a simplified standard for passing EAP (Extensible Authentication Protocol) over a wireless (or wired) network. See Fig 9 below the 802.1X process. Figure 9 the802.1x The wireless client (laptop) is known as the Supplicant. The Access Point is known as the Authenticator and the RADIUS server is known as the Authentication server. 6. PROFFERED SOLUTION TO WLAN This involve the use of hardware and software solutions to help secure the wireless environment. Software measures include proper Access Point (AP) configuration, software patches and upgrades, authentication, intrusion detection systems (IDS), personal firewalls for wireless devices and encryption. Hardware solutions include smart cards, virtual private networks (VPNs), public key infrastructure (PKI), network segregation and biometrics. It should be noted that some of these solutions are now available either in hardware or software. http://www.iaeme.com/ijecet/index.asp 73 editor@iaeme.com

Modesta. E. Ezema, Chidera.C. Ezema and Asumpta Uju Ezugwu This solution should also include facilitation of encryption and authentication controls described in each wireless standard. Encryption in wireless communication is used primarily to protect the confidentiality of messages and connection setup data transmitted over the network. Authentication in wireless networks occurs to validate connections between one device and another, or to confirm that a user is permitted to connect to a particular network. Encryption protocols utilized in past wireless standards have been found to be insecurely implemented and consequently easy to defeat (e.g. WEP RC4). Utilizing the most current revisions of wireless standards is recommended, as they tend to allow use of highly secure encryption protocols that have yet to be defeated (e.g. WPA2 s AES protocol). The actual choice of encryption protocol utilized is dependent on organizational infrastructure and should be encouraged. 7. CONCLUSION The diligent management of network security is essential to the operation of networks, regardless of whether they have segments or not. It is important to note that absolute security is an abstract concept it does not exist anywhere. All networks are vulnerable to insider or outsider attacks, and eavesdropping. No one wants to risk having the data exposed to the casual observer or open malicious mischief. wireless networking, steps can and should always be taken to preserve network security and integrity. We have said that any secure network will have vulnerabilities that an adversary could exploit. This is especially true for wireless ad-hoc networks. The various method of wireless networking security discussed can help to greatly reduce the vulnerability in wireless networks. REFERENCES [1] http://netsecurity.about.com/od/hackertools/a/aa072004b.htm [2] https://developer.mozilla.org/en/docs/introduction_to_public-key_cryptography [3] http://www.ksys.info/wlan_security_issues.htm [4] http://www.acm.org/crossroads/xrds2-4/intrus.html [5] http://www.dummies.com/how-to/content/wireless-networking-infrastructuremode.html [6] https://technet.microsoft.com/en-us/magazine/dd296746.aspx [7] http://kb.netgear.com/app/answers/detail/a_id/1141/~/what-is-wep-wirelessencryption%3f [8] http://compnetworking.about.com/cs/wirelesssecurity/g/bldef_wep.htm [9] http://compnetworking.about.com/cs/wirelesssecurity/g/bldef_wpa.htm [10] http://www.wikihow.com/find-the-mac-address-of-your-computer [11] http://compnetworking.about.com/cs/wireless/g/bldef_ssid.htm [12] http://www.computerworld.com/article/2581074/mobile-wireless/how-802-1xauthentication-works.html [13] Sachin R. Sonawane, Sandeep Vanjale and Dr. P. B. Mane. A Survey on Evil Twin Detection Methods for Wireless Local Area Network, International journal of Computer Engineering & Technology, 4(2), 2013, pp. 493-499. http://www.iaeme.com/ijecet/index.asp 74 editor@iaeme.com