StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless Network Security - Research Paper Example

Cite this document
Summary
This paper, Wireless Network Security, discusses various issues and aspects of security-related features in wireless networks. The primary goal of this research is to present a comprehensive discussion of various features included in wireless network security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Wireless Network Security
Read Text Preview

Extract of sample "Wireless Network Security"

Introduction At the present, a user can use a notebook computer, laptop, Personal Digital Assistance PDA), or a mobile phone with a wireless network connection in order to use internet at any time and at any location where wireless signals are accessible (Weber and Bahadur; Makker). In other words, wireless networking has become a well liked trend that is heavily adopted by the businesses as well as individuals. In this scenario, wireless network security is a promising topic that covers a lot of critical features. At the present, there exist a lot of wireless security technologies and versatile tools for the organizations as well as individuals. This paper discusses various issues and aspects of security related features in wireless networks. The primary goal of this research is to present comprehensive discussion on various features included in wireless network security. This paper will discuss topics like wireless network security tools, their advantages and directions. And in the last it will offer some valuable recommendations. An Overview of Wireless Networks These days wireless networking has become an attractive trend and the professionals in all over the world are adopting wireless network security with advance trends and new features in order to protect their networks from various security threats. In other words it can be said that these networks have capability to launch interconnection among various devices. In this scenario, the main advantage that we gain from wireless networks as compared to other networks is that this technology releases us from the use of wires. In view of the fact that the communication among several nodes is established through radio waves thus there is no need of wires for establishing a network. Additionally, the wireless adapter which is located inside the machine transforms data into the radio frequency transmission and later on broadcasts it. In addition, wireless technology is normally acknowledged as Wi-Fi technology or simply WLAN technology. In this scenario, the wireless security is a main feature that we discuss throughout wireless networks (Makker; Moran; Turban, Leidner and McLean). Another advantage of these networks is that users of this network are not bound to limited location despite of its usage where they have facility of signals. Hence it decreases the expenditure required for cabling or wires that is required in wired networks. In addition, wireless technology helps us to release from the copper wires. Here one important thing to remember is the wireless security for Wi-Fi applications. In this growing era where technological aspects are growing with users of economy related needs, we have to fulfill all the essential requirements for establishing an effective wireless network. Thus, the wireless network security is a major issue that is to be considered while establishing wireless networks (Weber and Bahadur; Makker). Why wireless security is Important? • It is important due to the fact it is now accessible everywhere, and hardware required for it has a low cost that will facilitate a common user to purchase it from market (Asadoorian). • The aspect of Wi-Fi is used in almost every advanced application round the globe. Hence flexibility increases. We can observe that this innovative technology is now available easily in everything. We have example of those things that we use in our daily life like mobile phones to our daily life usage appliances (Asadoorian). • Although it is a true fact that the fame of Wi-Fi technological hotspots are enhancing. In most of applications wireless security is not implemented properly (Asadoorian). • As we know that Wi-Fi technology could pass through long distances thus security needs are essential for making our communication secure (Asadoorian). • An important perspective of Bluetooth is that this technology is spreading and almost used in every spot round the world but this one is vulnerable to attack (Asadoorian). Additionally analysts and observers have been focused greatly on various security related aspects of Wi-Fi technological applications (IEEE 802.11) that we mostly analyze in wireless LAN systems. In addition, present applications are making rapid growth and use of these systems into a broad range of networks. Moreover these networks are extensively used for a broad variety of applications that are usually supportive for security measures or secure solutions that meet up the needs of a broad variety of customers (Proxim Corporation). As discussed earlier that wireless security is important in our daily life, while working at home or either in an organization. We must make our wireless network secure in order to secure our personal data and information since they are most valuable to us. In view of the fact that if we have an un-safe wireless system it might allow any spy or unauthorized user to access or network and discover our personal information and working activities. However it depends extensively on the configuration of our corporation based or home based network. In this way a hacker could get complete access to our machine hard disk. This is all due to an unsecured or unsafe wireless network (Posey). In addition there are some other critical circumstances in unsecure wireless environment. It is seen and reported in some situations that a hacker can carry out some malicious act against us or else some of our neighbor may sponge off our internet connection. Thus this will not only result in decreasing actual bandwidth, for which we are paying some cost but if our fellow citizen or some naughty neighbor carries out a criminal activity using our network on internet, it could be traced back to our internet connection (Posey). Important Tools for Wireless Network Security NetsTumbler Netstumbler is a well known tool for wireless network security. It facilitates in displaying the wireless enabled access spots, Service Set Identifier (SSIDs), several channels by enabling WEP encryption or facilitate in strengthening the signals. Moreover Netstumbler could be helpful for establishing connection with communication technology like GPS for accurate log and the exact locations of access spots (Nsasoft llc.). PRISMSTUMBLER Another tool for network wireless security is Prismstumbler. This tool is basically a network communication model like wireless LAN (wireless local area network) or simply WLAN. Prismstumbler is used for scanning the signal frames from access spots or access points. Moreover, the operations performed by Prismstumbler take place through constantly switching channels and monitoring the frames that are received on the currently selected channel (Nsasoft llc.). WEPCRACK WEPCrack is basically a security protocol. WEP stands for Wired Equivalent Privacy. This tool is considered as the first one among the WEP encryption cracking utilities. However this security related tool is an open source tool that is normally used for breaking the 802.11 WEP keys. That’s why it is also written as (802.11 encryption protocol) (Nsasoft llc.). AIRSNORT There is some sort of similarity between airsnort and wepcrack. However, Airsnort is basically a wireless local area network (WLAN) tool that helps in cracking Wired Equivalent Privacy (WEP) encryption keys. This tool is vital in wireless broadcasting as well as automatic computation of the encryption keys when sufficient packets have been combined (Nsasoft llc.). Directions for Security of Wireless Networks There are some important directions provided by National Institute of Standards and Information Technology Laboratory. This organization is also known as NIST. Although NIST has published several suggestions for improving security related needs for wireless networks. It offers 3 major aspects related to wireless security of network: (Radack) Critical issues related to security are generally linked with wireless local area networks (WLANs) that are based directly with the Institute of Electrical and Electronics Engineers. This standard is commonly known as IEEE (standards 802.11) (Radack). Various issues and problems related to security of wireless personal area networks are based on the terms that meet Bluetooth specifications, developed by an industry group (Radack). The 3rd aspect is linked with the secure environment of communication. It means that security of those wireless devices that are considered as handheld (Radack).  Trends in Wireless Network Security Although each product has some problems and advantages either on user side or business side and these problems may vary from technical specification to installing arrangements. When we talk about the various aspects of wireless network security, they offer a lot of advantages. As we know that in this rapid growing technological era where new innovative trends and advanced technologies are emerging every day we have to compete in this complicated environment. In this way we can say that implementation of security techniques is essential in wireless networks so that businesses and individuals could attain the benefits of this marvelous technology (Wireless-Center). Wireless network security is always a most important issue among those who want to deploy wireless networks. Luckily, at the present both the security solutions and products offered by technology developers and user knowledge about wireless network security are improving. Thus, wireless networks offer wide-ranging security features and facilities, and through the effective protection of these networks, organizations and individuals can assertively take advantage of the features and facilities they present (Cisco). Seeing that wireless networks offer a lot of advantages, but there is a dark side to wireless networks. On the other hand, without implementing appropriate security techniques, the data and information of a business or an individual can simply be accessed on the wireless network. For instance, by means of free software available on the internet along with directional antenna, hackers can easily retrieve network traffic and important information from a distant location (Lucid Link). For many years, WEP encryption method has been used as a primary security tool between wireless clients and wireless access points. In this scenario, there emerges a problem that is WEP protocol is still basically not strong for the reason that it makes use of a static encryption key however the power of WEP encryption has augmented to a greater extent since Wi-Fi emergence. Yet, motivated hackers can without difficulty hack WEP encryption by making use of freely available hacking tools. Thus, in this scenario, prior to the implementation of wireless network, people should remember that they may need to change their security technique to include WPA and/or the similar security measures that are offered by the IEEE (B. M. Posey). Recommendations for Securing Wireless Networks In this growing era where wireless network is one of the emerging trends that is considered more flexible than other networks we need such an environment where security is possibly enabled for users. However mostly advanced developments face various security risks that might be tackled bitterly for ensuring that vital assets remain protected. So we must assess the threats we can face, make analysis and evaluate the overall safety controls of systems for wireless networks. On the other hand, the maintenance of a secure wireless network is a continuing procedure that initially requires greater effort as compared to new networks and structures (Radack).  Conclusion We depend a lot on wireless communication networks in this technological era. Security based implications are most important for service providers as well as for users and users want to solve these critical concerns by service providers and network designers. Hence security of wireless networks is a promising area for future research. This paper has presented an overview of various security aspects of wireless networks. This paper has shown that wireless networks bring a lot of advantages and opportunities for the people but at the same time they cause a lot of security issues and problems. This paper has discussed the tools and technologies which can be used to deal with these security issues. Works Cited Asadoorian, Paul. PaulDotCom. 2011. 21 April 2011 . Cisco. Securing Wireless Networks. 2011. 18 April 2011 . Lucid Link. The Benefits of Wireless Networks. 2007. 19 April 2011 . Makker, Aneesh M. Wireless Network Security Basics . 2010. 24 April 2011 . Moran, Joseph. Wireless Home Networking, Part 2, WiFi Standards. 05 November 2002. 03 April 2011 . Nsasoft llc. Wireless Network Security. 26 December 2005. 22 April 2011 . Posey, Brien M. WPA wireless security offers multiple advantages over WEP. 10 September 2003. 21 April 2011 . Posey, Brien. Wireless Network Security For The Home. 05 May 2005. 21 April 2011 . Proxim Corporation. WIRELESS NETWORK SECURITY. 2003. 22 April 2011 . Radack, Shirley. SECURITY FOR WIRELESS NETWORKS AND DEVICES. 2011. 19 April 2011 . Turban, Efraim, et al. Information Technology for Management: Transforming Organizations in the Digital Economy . New York: Wiley, 2005. Weber, Chris and Gary Bahadur. Wireless Networking Security. 2011. 19 April 2011 . Wireless-Center. Advantages and Disadvantages of WLANs. 2011. 22 April 2011 . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Wireless Network Security Research Paper Example | Topics and Well Written Essays - 1750 words, n.d.)
Wireless Network Security Research Paper Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/information-technology/1751446-the-wireless-network-security
(Wireless Network Security Research Paper Example | Topics and Well Written Essays - 1750 Words)
Wireless Network Security Research Paper Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1751446-the-wireless-network-security.
“Wireless Network Security Research Paper Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/information-technology/1751446-the-wireless-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless Network Security

Wireless security

Security+ Guide to network security Fundamentals (3rd ed.... The reason is that hackers break into the networks to identify the security holes present in the networks.... The aim of the hackers is not to commit theft, destroy, or steal any sort of private information; rather the intention is to make the network administrators improve the security of their networks.... Ciampa (2009) found that a hacker is a person who makes use of advanced programming skills and techniques to break illegally into any specific computer system in order to expose the security flaws (p....
2 Pages (500 words) Essay

Critique on Wireless Hotspots: Petri Dishes Of Wireless Security by Bruce Potter

This lack of bidirectional authentication poses the very large and real risk of a hacker, acting friendly to gain access, can then use the wireless network to gain access to other clients accessing it.... This certificate level access is nearly impossible to use at a hotspot since the accessing client's would have to have the keying certificate in order to enter the wireless network.... Running Head: CRITIQUE ON WIRELESS HOTSPOTS Critique / Position on the article “Wireless Hotspots: Petri Dishes of Wireless security” by Bruce Potter Instructor Date Critique / Position on the article: “Wireless Hotspots: Petri Dishes of Wireless security” by Bruce Potter This article by Bruce Potter takes the position that security over a typical wireless (Wi-Fi) hotspot network is not achievable at the current state of technology, at least at the small scales of individual and small business usage....
4 Pages (1000 words) Essay

Different Cost Management Factors in an IT Project

Connectively, the IT project will take into consideration the following deliverable: the project team will be provided with the Wireless Network Security handling point paper and a document for access configuration.... In order to enhance security and vulnerability of authorized access, the project managers responsible for this IT project will work closely with the subproject team to ensure maximum data security by preventing unauthorized access of the company data (Nahari & Krutz, 2011)....
5 Pages (1250 words) Assignment

Security in Wireless LAN

Antenna takes directions from the wireless network interface card of the computer.... The laptop must be having a wireless network interface PCMCIA card for WLAN compatible.... wireless network interface cards work with a 48-bit MAC address associated with them.... MAC address filtering is used to limit the number of hardware components that can access the wireless network.... Before venturing onto the security aspect it will be worthwhile here to have a glimpse of setting up a reliable and efficient network....
12 Pages (3000 words) Essay

Creating the report

The following policies are vital: Password policy of networking devices and hosts, Wireless Network Security policy, Anti-Virus security policy and physical security policy.... network security policies and procedures .... However, in case of a wireless network transmission, connection to other networks of the organization will be prohibited.... vendors who have access to the organization's information security and forensic laboratory....
2 Pages (500 words) Research Paper

Security Risk Mitigation Policies

Wireless Network Security: Vulnerabilities, Threats and Countermeasures.... In the case of the wireless network bridge, there is need for effective management to the threats linked with wireless technology.... In this case, there is a security issues with the wireless network connection as well as physical breach on customer's personal data.... In the case of the wireless network bridge, there is need for effective management to the threats linked with wireless technology....
2 Pages (500 words) Coursework

LAN Networks Issues

A guide to computer network security.... However, the four mediums differ in a number of factors such as performance, bandwidth levels, security, management, noise susceptibility, cost… A good example of their diversity is the type of applications they apply (digital or analogue), where the twisted pair cable is used in analogue voice LAN Networks al Affiliation) Question One There are a variety of transmission media formats but the core types are fiber optics, twisted pair cable, wireless and coaxial cables....
2 Pages (500 words) Essay

GSM Phone Security

The writer of the paper “GSM Phone security” states that there are specific attacks that can be done on the GSM phone.... The A5/3 is the most recent standard and has proven to better than the previous standards in terms of security but has its loopholes too.... This is a loophole that can be a security threat to the company as the CEO uses the phone for all her conversations as well as email communication....
10 Pages (2500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us