Information security in wireless local area networks - Essay Example

Comments (0) Cite this document
Summary
Information Security in Wireless Local Area Networks Faculty Name Your Name Subject Name/ Code Date Abstract Rapid growth of wireless communication has become a common in the enterprises. Now wireless local area networks (WLANs) applications are installed easier than earlier applications…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Information security in wireless local area networks
Read TextPreview

Extract of sample
"Information security in wireless local area networks"

Download file to see previous pages Man in the Middle (MitM) is a real information security concern for the Wireless Local Area Networks. In the MitM attack, address of the proxy server changes with any fake address and hacks the wireless network in the form of traffic tunnelling, proxy attack, DNS poisoning, and rout mangling. This paper also outlined the solution of the major information security issues through the development of the techniques and protocols. Alloy model is the core focus in this paper, which contains the written code. Execution of this code is verified whether it met the expected function. Development of these techniques and protocols is aimed to ensure the data integrity and security. C# is the core programming language for the client side and PHP programming is used for the server side. Model checking involved the testing of the written features of the application in terms of verification of the descriptions. Static analysis, deductive verification, dynamic analysis and software model checking are the best examples of technology, which use the theorem proving for the validity of verification. Information Security in Wireless Local Area Networks Summary and Conclusion Introductory chapter of thesis narrates the aims and objectives of the work, and describes the structure of the thesis. This early chapter is focused on the Wireless Local Area Networks (WLAN), which is the biggest segment in the Wireless products’ market. Wireless Local Area Networks facilitates the communication and computing in spatial domains including the enterprises, hospitals, offices and campuses. In these environments, WLAN expands and complements the coverage in the existing networks. There are three main objectives behind the information security for the wireless networks such as the data integrity, confidentiality, and availability. Data Integrity; It is ensured that no data or information has been modified. Confidentiality; It is ensured that nobody other than receiver can see or read the information. Availability; It ensures the availability of information needed at any time. The second chapter of this thesis work has been on the history and background of the study. This chapter describes the ways of the wireless detection using when data packets pass through the Network Interface Card (NIC). Managed and “rfmon” modes of data transferring through NIC are stated. The function of the Kismet has been specified when data packets pass through the NIC and saved in the file named as “pcap”. Beacon frame is most wanted for the sniffer that contains the information about sniffing operation. Data sending and receiving over the WLANs need the connection with Access Points. The requirements of the encryption protocol for the data encryption of the beacon frame are also realized in this part of the thesis. A hacker attacks the wireless network and selects a wireless channel from where it attacks the network. Hacker uses the two probing techniques such as active and passive. NetStumbler tools works as active probing and receives the Service Set Identifies (SSID) and host information. An active probe detects the access points in scope of hackers’ transmission. Passive Probing technique is used to drop the data packets over a channel and neither data receiver nor the data sender can detect the attacker’s presence. Surveillance is a passive technique that a hacker uses to capture the data traffic over a ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information security in wireless local area networks Essay”, n.d.)
Information security in wireless local area networks Essay. Retrieved from https://studentshare.org/information-technology/1467764-information-security-in-wireless-local-area
(Information Security in Wireless Local Area Networks Essay)
Information Security in Wireless Local Area Networks Essay. https://studentshare.org/information-technology/1467764-information-security-in-wireless-local-area.
“Information Security in Wireless Local Area Networks Essay”, n.d. https://studentshare.org/information-technology/1467764-information-security-in-wireless-local-area.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Wireless Security
...carriers that at present make use of GSM are T-Mobile and AT&T. In this scenario, Carriers Sprint and Verizon both make use of the rival Code Division for Multiple Access (CDMA) communication technology, though Verizon has moved to the GSM area when it launched its own LTE network in 2010 (Bellaire, 2010; Reed, 2011). REGULATORY ISSUES IN WIRELESS NETWORK There are numerous security related issues in communication and collaboration at the wireless communication networks. These security and privacy issues vary from situation to situation; however, in all cases the main challenge and threat is personal...
12 Pages(3000 words)Research Paper
4G Wireless Networks
...perspective, 3G provided the users the luxury of multimedia streaming. 4G added more amenities on top of that, including high definition (HD) services for audio-video conference, and online television via smart phone. Such differences in service and applicability are primarily emanated from the network architecture of these two technologies, also from associated upload and download speed. 3G network is based on wide area cell; on the other hand, 4G integrated Local Area Network (LAN) with such wide area architecture. Consequently, data throughput rate for these two technologies also varies significantly. While 3G is...
4 Pages(1000 words)Essay
4G Wireless Networks
...? [4G Wireless Networks] Compare and contrast 3G wireless networks to 4G networks Cellular data networks often referred to cellular generation is an advancement of cellular communication. This advancement includes 1G, 2G, 3G and 4G network communication protocols. The most recent version which is referred to 4G provides higher speed and faster communication as compared to 3G networks. The international standards recognized for mobile communication are regarded as 3G and 4G. The standards are used for specifying how the airwaves are utilized for broadcasting information which includes...
4 Pages(1000 words)Research Paper
Wireless Networks
...private or public. A MAN can support both data and voice, and might even be related to the local cable television network. 3.3 Wireless Personal Area Networks (PAN) A WPAN (wireless personal area network) is a personal area network - a network for interconnecting devices centered on an individual person's workspace - in which the connections are wireless. Typically, a wireless personal area network uses some technology that permits communication within about 10 meters - in other...
5 Pages(1250 words)Essay
Wireless Networks-WLAN's
...resulted in most Local area networks within corporate environments turn towards getting wireless. Such networks are known as wireless LANs. Such a wireless LAN requires the use of two major components that eliminate the requirement for any cabling. These are the access point (used for connecting a wireless LAN with a wired backbone network) and a wireless client adapter (that facilitates the connection of wireless-enabled devices and computers to connect to the network through the access point) (Harold Davis, 2000). The latest...
23 Pages(5750 words)Essay
Wireless networks technology
...12 December 2009 Wireless networks technology A wireless network offers the facility to shift PC or device anywhere where they can attain the wireless signal. In place of ensuring that there is a network cable in each room of the office, a wireless network offers approximately unrestricted flexibility while facilitating all the members to reach or use the organization’s network and any other resources that use wireless connection (for instance printers). A wireless network is an inexpensive substitute to a wired network...
2 Pages(500 words)Assignment
Wireless Area Network
...WIRELESS AREA NETWORK by Haider Cheema Academia Research INTRODUCTION Networking is the linking of computing devices together. Networks are defined by the area it covers. For a typical small company Local Area Network (LAN) is employed, whereas Wide Area Network (WAN) is used across cities or even across the continents. To network a company of 100 computers in close proximity, LAN is the best solution for sharing of data. It is defined as, “Network of personal computers in a small area (as an office) for...
2 Pages(500 words)Coursework
Security in Short Range Wireless Networks
...of vital network services to the legitimate users. Masquerading is also a problem. The attacker may impersonate an authorized user and gain access to unauthorized information. This thesis will also provide security problems and solutions to each of the mentioned wireless network. Security problems and counter-measures of Wireless Fidelity (Wi-Fi) Wi-Fi is a local networking technology that works on IEEE 802.11 standard implemented by Wi-Fi compatible devices (Davis, 2004). It is used at homes, offices and public hotspots and offer a relatively higher peak data rates than 3G systems do....
10 Pages(2500 words)Thesis
4G/5G wireless networks
...and packet loss to the point where the consumer experience was optimal. Baset and Schulzrinne (2006), established that Skype uses the STUN protocol to identify firewalls or NATs and this makes it possible for Skype to work seamlessly behind firewalls and NATs. Specifically, Skype randomly selects listener and sender ports, it uses TCP as its voice streaming protocol to traverse NATs and firewalls without necessarily having any firewall or NAT transversal server. The investigators also noted that Skype secures the best network and CPU resources during a call. For example, Skype changes its application priority to high to make sure that it secures the best CPU resources. Skype further uses...
6 Pages(1500 words)Research Paper
Virtual Local Area Networks
...Virtual Local Area Networks Virtual Local Area Networks Local Area Network is a group of computers and associated devices that share a common communication line or a wireless link to a server. For many years in the past, LANs were developed as single broadcast domains. The rise of virtualization has fueled the development of Virtual Local Area Networks which allow the network administrators to logically group network nodes and partition their networks without the need for...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Information security in wireless local area networks for FREE!
Contact Us