StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless security beyond 802.1x - Essay Example

Cite this document
Summary
801.11 is a wireless local area network standard that provides better encryption for networks using the 802.11b (Wi-Fi), 802.11g, and 801.11a standards. The 802.11i standard needs the use of new encryption key protocols such as the Temporal Key Integrity Protocol (TKIP) and AES…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Wireless security beyond 802.1x
Read Text Preview

Extract of sample "Wireless security beyond 802.1x"

Wireless Security Beyond 802.1x Grade May 25th Wireless Security Beyond 802.1x 801.11 is a wireless local area network standard that provides better encryption for networks using the 802.11b (Wi-Fi), 802.11g, and 801.11a standards. The 802.11i standard needs the use of new encryption key protocols such as the Temporal Key Integrity Protocol (TKIP) and AES (Advanced Encryption Standard). For a long time, 802.11 wireless security has been safeguarded with the use of 802.1x. However, there are several research technologies that have been developed to enhance 802.

11 wireless security (Gao, Zheng & Lu, 2015). The technologies include the IPsec VPN and 802.1x. However, many consider the IPsec an improvement on the 802.1x. However, to ascertain the truth, we need to carry out an analysis of the protection provided by the different technologies.The 802.1x assists in controlling access to a computer network. The technology is a port-based access control method that is defined by the Institute of Electrical and Electronics Engineering which can be configured to require mandatory authentication between the network and the client.

Communications become impossible without the authentication. Many people consider the 802.1x technology as the foundation of wireless security. However, deploying the 802.1x technology has its challenges. The technology requires devices that are compatible with 802.1x . The technology has weakness in its protocol, as it only authenticates at the establishment of a connection. Further connection does not require authentication, resulting in security risks (Al-Shaer, 2014). Additionally, the technology does not have centralized management capability.

As such, the IPsec VPN became introduced. The Virtual Private Networks based on IPsec allow a layer of security to become a part of the wireless network, allowing for the protection of all traffic that flows in and out of the network. The method has several advantages over 802.1x including;Invisibility - Since the technology is based at the network level, it remains invisible in its operations (Snader, 2014). The end users do not have to learn its existence, nor do they have to interact directly with it, which is different from the 802.

1x technology that requires authentication from clients.Monitoring and security - Since the technology is based on the network layer, it can easily monitor all traffic which passes via the network, and secures both inbound and outbound traffic.Lack of dependence on applications - The IPsec technology does not depend on applications to become effective, as the s=entire system is operated at the network level. As such, it avoids compatibility issues, which are common in 802.1x systems.However, there are several disadvantages of using the IPsec.

Some of these disadvantages include;Broken algorithms - A number of key algorithms used by the IPsec have been cracked, making the technology less reliable. As such, it poses a great risk, as people usually do not change their security algorithms.Higher processing loads - The encryption and decryption of information through IPsec will result to a massive movement of megabytes of data. As such, more processing power is required for the technology, compared to 802.1x.As such, when we compare the wireless technologies, it becomes evident that IPsec allows for the definition of zones with varying levels of trust, while 802.

1x has the same trust levels (Aydin & Aydin, 2014). In addition, both technologies act as methods of preventing entry or access to vital systems. However, there are several differences. After carrying out the analysis, it becomes evident that using the IPsec VPN is more beneficial, considering the lower compatibility costs, invisibility and security level provided by the method.ReferencesAl-Shaer, E. (2014). Modeling and Verification of Firewall and IPSec Policies Using Binary Decision Diagrams.

In Automated Firewall Analytics (pp. 25-48). Springer International Publishing.Aydin, A. H., & Aydin, M. (2014). Studying the Performance of Secure IEEE 802.11 g. American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), 2(1), 12-17.Gao, W., Zheng, X., & Lu, B. (2015, April). IEEE 802.11 i WLAN Security Protocol Based On Genetic Software Engineering Model. In 2015 International Conference on Advances in Mechanical Engineering and Industrial Informatics. Atlantis Press.Snader, J. C. (2014). VPNs Illustrated: Tunnels, VPNs, and IPsec.

Addison-Wesley Professional.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless security beyond 802.1x Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Wireless security beyond 802.1x Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1697053-wireless-security-beyond-8021x
(Wireless Security Beyond 802.1x Essay Example | Topics and Well Written Essays - 500 Words)
Wireless Security Beyond 802.1x Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1697053-wireless-security-beyond-8021x.
“Wireless Security Beyond 802.1x Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1697053-wireless-security-beyond-8021x.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless security beyond 802.1x

Entitlement Programs and the handicaps that go along with having them

Аgаinst this bаckdrop, millions of fаmilies left welfаre.... Studies of the fаmilies thаt left welfаre in this post-entitlement erа document the experiences of welfаre leаvers.... Fаmilies thаt left welfаre hаve joined the rаnks of the working poor—while they аre generаlly better off thаn they were on welfаre, they still fаce substаntiаl hаrdships....
14 Pages (3500 words) Essay

International Standardization and Information-Communication Industries

Ans 1: Vertically integrated companies are those where a complete range of activities is supported “from basic research to applied development.... ?? (US Congress, OCT, 1986:2).... As a result, vertically integrated companies are those who manage all aspects of their production… In the United States, the electronics industry is specialized with a large percentage of its semiconductors for example, being manufactured by firms that manufacture very few upstream materials or equipment and downstream materials....
12 Pages (3000 words) Essay

Multinational Running And Study Of Spirent Communications

An author of an essay "Multinational Running And Study Of Spirent Communications" discusses the point that Spirent started expanding their business operations by acquiring and merging with various firms related to telecommunications and electronics industry.... hellip; Spirent Communications is one of the leading telecommunications and measurement firms, based in Sussex, United Kingdom....
10 Pages (2500 words) Essay

Virtual Local Area Networks

Therefore, splitting a network into VLANs boost the performance, security and reduce the clogging on a large LANs (Yadav et al.... From the paper "Virtual Local Area Networks" it is clear that for those networks that need more than 500 devices to have access to the same network resources (to be in the same VLAN), it is recommended to use physical VLAN for easier network management....
8 Pages (2000 words) Essay

The Effects of Computer Science on the History of our Nations Wars

Considering the factor of overall development of the society, the security of a country is one of the prime concerns.... In order to strengthen the security of the country, the government also takes the use of latest technological up gradation.... The paper analyzes the various technological advancements in the overall security system of USA and the use of computer science in the history of American wars....
16 Pages (4000 words) Research Paper

The Nature of Encryption Exploitation Technologies

With advancements in information and communication technology and the implementation of information systems within organizations, data security has become a serious issue.... nbsp; Symmetric encryption is one of the major methods that are used in computer security in the exploitation of encryption technologies.... The security behind symmetric encryption lies in the fact that it is only the individuals with the same key who are able to access and read data, information or messages which have been encrypted by the use of the symmetric key (Knott & Steube, 2011)....
6 Pages (1500 words) Coursework

Strategic Management In The Aviation Industry

Besides, the airport is also privileged to be one of the many airports that offer free wireless internet access to its client.... Istanbul Ataturk airport is the largest airport in Turkey.... It has become European's fastest-growing major airport.... The paper "Strategic Management In The Aviation Industry" discusses some limitations Istanbul Ataturk Airport has encountered in its endeavors....
16 Pages (4000 words) Research Paper

The Rise in Cybercrime and the Possible Remedy

In addition, the organizations lose their customers who feel that they do not get enough security of their money in these organizations.... With the current embrace of technology in the business sector, the internet has become a new platform for theft especially with most internet users being ignorant of their privacy and security in their online presence....
6 Pages (1500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us