TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY



Similar documents
EKT 331/4 COMMUNICATION NETWORK

NETWORKING TECHNOLOGIES

CHAPTER 1 1 INTRODUCTION

Narrowband and Broadband Access Technologies

Communication Networks. MAP-TELE 2011/12 José Ruela


Security in Wireless Local Area Network

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs

Telecommunications, Networks, and Wireless Computing

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Chapter 7 Low-Speed Wireless Local Area Networks

IT Data Communication and Networks (Optional)

Cabling LANs and WANs

Network Topologies. Network Topologies

Wireless LAN Concepts

ITL BULLETIN FOR AUGUST 2012

Chapter 5. Data Communication And Internet Technology

communication over wireless link handling mobile user who changes point of attachment to network

CSCI 362 Computer and Network Security

Wireless Local Area Networking (WLAN) Security Assessment And Countermeasures

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

HANDBOOK 8 NETWORK SECURITY Version 1.0

Wireless LAN Networking White Paper

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

TL-WN310G 54M Wireless CardBus Adapter

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Course Duration: Course Content Course Description Course Objectives Course Requirements

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G

WIRELESS ETHERNET (IEEE )

Wired & Wireless LAN Connections

ECB1220R. Wireless SOHO Router/Client Bridge

Local Area Networks (LANs) Blueprint (May 2012 Release)

Demystifying Wireless for Real-World Measurement Applications

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

CHAPTER. Wireless Networking

Network Technologies

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Computer Networking Networks

IT4405 Computer Networks (Compulsory)

LTE, WLAN, BLUETOOTHB

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

EECC694 - Shaaban. Transmission Channel

Post-Class Quiz: Telecommunication & Network Security Domain

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Networks. The two main network types are: Peer networks

Introduction to Ethernet

HIGH POWER WIRELESS N MINI USB ADAPTER K-300MWUN USER S MANUAL

A Division of Cisco Systems, Inc. Wireless A/G. USB Network Adapter. User Guide WIRELESS WUSB54AG. Model No.

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

The data can be transmitted through a variety of different communications platforms such as:

Computer Networks. By Hardeep Singh

Industrial Networks & Databases

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

Municipal Mesh Network Design

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Computer Networking: A Survey

Chapter 9 Communications and Networks

Tri-Band RF Transceivers for Dynamic Spectrum Access. By Nishant Kumar and Yu-Dong Yao

An Evaluation of Security Services schemes For IEEE Wireless LAN s Using Qualnet

Wi-Fi and Bluetooth - Interference Issues

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

CWNA Instructor Led Course Outline

Wireless Local Area Networking For Device Monitoring

Introduction to Computer Networks and Data Communications

TL-WN7200N 150Mbps High Power Wireless USB Adapter

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

Best Practices for Outdoor Wireless Security

Network Technology CMP-354-TE. TECEP Test Description

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Network System Design Lesson Objectives

TL-WN612AG / TL-WN652AG / TL-WN653AG

Lecture 17: Wireless Networking"

Data Transmission. Raj Jain. Professor of CIS. The Ohio State University. Columbus, OH

Telecom Regulatory Authority Technical Affairs & Technology Sector WiFi Technology

Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading

TL-WN727N Wireless Lite-N USB Adapter

Figure 1: Bandwidth and coverage of wireless technologies [2].

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

HP AP8760 Dual Radio a/b/g Access Point Overview

Wireless Network Standard and Guidelines

Wireless Network Policy

WI-FI TECHNOLOGY: SECURITY ISSUES

Introduction to Optical Networks

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Getting the Most Out of Your WirelessHART System

Transcription:

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE SUPERVISION OF Dr. DURGESH PANT PROFESSOR AND HEAD, DEPARTMENT OF COMPUTER SCIENCE, S.S.J. CAMPUS, ALMORA, KUMAUN UNIVERSITY, NAINITAL, UTTARAKHAND (INDIA) 2009

A LAN that employs radio frequency (RF) or perhaps infrared (IR) transmission rather than a wired technology such as coaxial cable, twisted pair, or optical fiber is known as WLAN. A typical WLAN comprises fixed-location transceivers known as access points (APs) to which client workstations and peripherals connect via RF technology. The access points typically are hard wired to switches and routers that interconnect them and provide access to servers. The APs are fitted with radio transceivers and omni-directional antennas. The APs are located at central points where there is good line of sight (LOS) to the workstations and link quality. Most WLANs are standards-based versions from the IEEE 802.11 Working Group. At the Physical Layer the RF specifications include both direct sequence spread spectrum (DSSS) and frequency hopping spread spectrum (FHSS). At the Data Link Layer, the medium access control (MAC) protocol is carrier sense multiple access with collision avoidance (CSMA/CA). Most WLANs operate in the 2.4 GHz unlicensed ISM (Industrial, Scientific, and Medical) band, which avoids the expensive and lengthy licensing process, but carries with it the potential for interference from other systems in proximity. As power levels are low, distances generally are limited to 500 ft circumference. Wireless technologies can be differentiated by the following criteria: Protocol: ATM (Asynchronous Transfer Mode) or IP (Internet Protocol) Connection type: Point-to-Point (P2P) or multipoint (P2MP) connections Spectrum: Licensed or unlicensed The different wireless technologies are as follows:

Broadband Narrowband WAN WAN and WLAN Licensed Unlicensed Digital Analog Line-of-site Non-line-of-site Simplex Half-/full-Duplex Point-to-point Multipoint Broadband Data rates that exceed 1.5 Mbps Licensed Granted by or purchased from the FCC Line-of-site Direct line of site between two antennae Simplex One transmitter The concept of wireless LAN was first introduced in 1980 there after many companies tried to implement variety of wireless LAN applications using spread spectrum, infrared and wideband radio technologies. In 1997, IEEE 802.11 standard provided a solid platform for new applications. The chips supporting IEEE 802.11 standards are already in the market.

The current wireless LAN standards offer very unsatisfactory level of security so the main objective of our work is to suggest appropriate logical modifications in these networks as well as focusing key management issues, authorization techniques and integrity of these systems and developing or modifying the security protocols currently used. The study has been dealt with taking six chapters in all. The first chapter, Introduction, provides the need of study of WLAN security; where and why the WLANs should be deployed. It also clears the scope and limitations of present work done. We have not considered the design issues and these issues are beyond the scope of the present study. However, the modifications in existing protocols are suggested. The second chapter, Wireless Local Area Networks at Glance, provides the glimpses of scope and future of WLANs and the range of existing WLANs. Different IEEE standards are also given proper space in this chapter. All the three WLANs generations are given space. Their deployment issues are mentioned. Different IEEE 802.11 standards are compared. Their merits and demerits are described. The WLAN topologies are duly explained. WLAN technologies such as infrared, UHF and different radio frequencies are given space. Spread spectrum and frequency hopping are also described. The third chapter, The IEEE 802.11 Architecture, is dealt with the architecture of 802.11 WLANs along with different WLAN topologies. Overview of services, such as

distribution of messages, access and confidentiality control services, relationship between services is provided. The fourth chapter, Security Paradigms of WLANs, deals with security paradigms of WLANs. This chapter includes security protocols and the major threats to WLANs. Different security protocols, such as, WEP and WPA are explained. The various types of threats to WLANs are described. The possible drawbacks of IEEE 802.11i are given. Possible modifications are provided in the fifth chapter Suggestive Modifications in Existing Security Protocols. Prevalent Security methods are analyzed and solutions are given. Some other future solutions like quantum cryptographic methods and biometrics are given place in the chapter. A new concept of incorporating biometric authentication in Pre-RSNA phase and quantum cryptography in four way handshaking in RSNA key establishment and management is floated. Biometric authentication of end user will make security more robust and fool-proof. Different types of adversary attacks, such as reflection attack and DoS, can be avoided by applying quantum cryptography in RSNA phase by generating the keys. The last chapter, i.e., sixth one, Conclusion and Summary, concludes the topic, summarizes the work done and provides the guidelines to the future researchers.