StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless Security Mechanisms - Essay Example

Cite this document
Summary
This essay "Wireless Security Mechanisms" focuses on the information being communicated with the help of a network is absolute without any physical constraints. But this can create difficulties in controlling who is supposed to receive the data and who should not. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Wireless Security Mechanisms
Read Text Preview

Extract of sample "Wireless Security Mechanisms"

Wireless Security Mechanisms It is significant to maintain the security aspects as more and more companies started to install wireless networking. Since the technology go on advancing, networking standards are taken up to make sure interoperability among vendors. Encouraged by both the demands of the users and the facilities offered by wireless networks, businesses began to organize wireless networking systems in places where wired networking topologies were employed. Because of the simplicity of wireless net working system use and the excitement of the new technology, many responsible people did not realize the risk involved in operating a wireless network. Wireless networks offer network connectivity in a wire-free setting where the physical limitation of a wired environment can be avoided. In other words the information being communicated with the help of network is absolutely without any of physical constraints. But this can create difficulties in controlling who is supposed to receive the data and who should not. Earlier, curious computer users followed a method called war dialling to identify latent vulnerable systems. The spiteful users can browse the log files and start hacking attacks at the computers that responded to the war dialling. As of the start of wireless networking, malicious users can move in the streets in their vehicles to carryout war driving to find out vulnerable wireless networks. Driving around business complex or a neighbourhood with a wireless-enabled laptop computer, help in connecting to and recording any number of corporate and private networks. This in effect gives the war driving hacker access to those secret resources with the same freedom as one of their employees, and remains hidden. Yet another common method is for an attacker to camp out at a public wireless execution, such as an airport. It may happen sometimes, a traveller may decide to check his email and transfer expense reports back to the home office while waiting for a flight. The attacker waits patiently, and gets all data transmitted from the traveller’s computer. Like this, an attacker may get passwords that would permit illegal access to a network, credit card information and possibly even proprietary information. A lot of methods to secure wireless networks exist today, each with their advantages and disadvantages (Klemencic, 2001). Wired Equivalent Privacy (WEP) The Wired Equivalent Privacy (WEP) algorithm is used to guard wireless communication from eavesdropping. One of the main purposes of WEP is to avert illegal access to a wireless network; this role is not an unequivocal goal in the 802.11 standard, however it is often considered to be an aspect of WEP. Wired Equivalent Privacy relies on a secret key that is common between a mobile station and an access point (i.e. a base station). The secret key is used to encrypt packets of information before transmission, and an integrity check is done to make sure that packets are not modified in transit. The standard does not talk about how the shared key is established. Usually, most setting up is use a single key that is shared between all mobile stations and access points (Borisov, et al 2001). WEP has been part of the 802.11 standard ever since early approval in September 1999. At that time, the 802.11 board was aware of some WEP restrictions; still, WEP was the top choice to make sure capable implementations worldwide. Even so, WEP has experienced a lot analysis and criticism over the past years. WEP is susceptible since the comparatively short IVs and keys that stay static. The subjects with WEP dont actually have much to do with the RC4 encryption algorithm. With only 24 bits, WEP in fact uses the same IV for diverse data packets. This recurrence of IVs results in the transmission of frames having key streams that is also similar. Suppose a hacker gathers enough frames based on the same IV, the individual can find out the shared values among them, i.e., the key stream or the shared secret key. This in turn helps the hacker decrypting any of the 802.11 frames. The fixed nature of the shared secret keys highlights this difficulty. Normally 802.11 dont supply any functions that support the exchange of keys among stations. Because of that, system administrators and users usually use the same keys for weeks, months, and even years. This gives malicious offenders ample of time to observe and hack into WEP-enabled networks (Geier, 2002). WiFi Protected Access (WPA) The Wireless Ethernet Compatibility Alliance (WECA) introduced WPA as a solution, based on the draft standard IEEE 802.11i for enhanced security in Wireless LANs. The authentication procedure of WPA and IEEE 802.11i accepted the three-entity model of IEEE 802.1x. IEEE 802.1x is the port-based access control protocol that was initially designed for the Point-to-Point Protocol (PPP), for example modem connections and wired LANs. The three units are the client, the AS, and the NAS (or in the case of WLANs, the AP). The AS exists in the network, and the client, who initially does not have access to the network, is connected to the NAS. The NAS is the unit that initially blocks the clients access to the network and also serves as an agent between the client and the AS during the authentication process. Thus, the NAS acts as a .security guard for the network, permitting only the authenticated by the AS that does the access choice. One of vital task of the authentication process is to establish a temporary secret that the client and the AP can use for message security. In short, the authentication process of WPA and IEEE 802.11i involves three entities: the client, the AP, and the AS. The client seeks access to the network. The AP protects the access to the network, permitting only the clients that the AS has authenticated. Lastly, the AS makes a decision whether the client is eligible for access to the network (Baek, et al 2004). 802.1x IEEE 802.1x is a specification for port-based authentication for wired networks. This also has been added for use in wireless networks. This offers user-based authentication, access control and a vital crucial element of transport. 802.1x is planned to be flexible and extensible. It depends on Extensible Authentication Protocol (EAP) for authentication that was initially intended for Point-to-Point Protocol (PPP) however was reused in 802.x. There are three types of entities in 802.1x: the client, the access controller and the authentication server1. Normally authentication server is a Remote Authentication Dial-In User Service (RADIUS) server which is connected to the wired network authentication. Since EAP is extensible it can use any authentication device. This can function at the network layer (layer 3) rather than the data link (layer 2) which adds to the flexibility of the protocol. 802.1x has few grave limitations for a wireless network. These are because of the reuse of security devices in a setting for which they were not intended. The difficulty in 802.1x is not the quality of the reused protocols, but the inadequate installation of the wired protocols to a wireless network. Actually 802.1x to function in a wireless setting, the access point/access controller must permit traffic to the authentication server prior to authentication. Both 802.11a WLAN protocol and 802.1x use state machines to operate properly. The adaptation of 802.1x to 802.11a left the two state machines loosely coupled. Because of the loose coupling between the state machine in the two protocols 802.1x is expose to session high-jacking attack from a stranger. 802.1x also is intended to give authentication of the client and not the access point. Mutual authentication is very important to protecting against man-in the- middle attacks. The inadequate key distribution makes it easier for an outside attacker to imitate an insider with all the linked vulnerabilities. Hence the 802.1x is to be attached to a device for blocking network access like inline authentication, so that unauthenticated clients cannot access the network. 802.1x, authenticate session stops the casual unauthorized user from accessing the WLAN. But, it does not stop a fairly expert attacker with few resources from successfully attacking the network (Welch, 2003). Remote Authentication Dial-In User Service (RADIUS) A Network Access Server (NAS) functions as a client of RADIUS. The client is accountable for passing user data to selected RADIUS servers, and then acting on the reply which comes back. RADIUS servers are responsible for getting user link requests, authenticating the user, and then returning all pattern information essential for the client to distribute service to the user. Communication between the client and RADIUS server are authenticated through the use of a shared secret, which is never sent over the network. Additionally, any user passwords are sent encrypted between the client and RADIUS server. The RADIUS server can support a variety of methods to authenticate a user. When user name and actual password given by the user, it can support authentication mechanism (Rigney, et al 1997). Virtual Private Network (VPN) A virtual private network (VPN) is the addition of a private network that includes links across common or public networks as the Internet. A VPN facilitates to send data between two computers across a shared or public internet in a manner that follow the properties of a point-to-point private link. The act of setting up and creating a virtual private network is known as virtual private networking. To attain a point-to-point link, data is encapsulated with a title that offers routing information letting it to pass through the shared or public transit internet to arrive at its intended place. To imitate a private connection, the data being sent is encrypted for secrecy. The data packets that are stopped on the shared or public network are unreadable without the encryption keys. The part of the link in which the private data is encapsulated is recognized as the tunnel. The portion of the link in which the private data is encrypted is identified as the virtual private network (VPN) connection. The VPN ensures privacy at the network layer. VPN is sharing out the Internet by permitting the internal use of private addressing systems (e.g. for Intranets). In contrast to present VPN implementations the VPN solution planned will support quality-of-service (e.g. assured bandwidth), thus removing the only real disadvantage of VPNs evaluated to actual private networks using leased lines (Braun, et al 1999). References Baek, K.H. et al (2004). A Survey of WPA and 802.11i RSN Authentication Protocols [Online] Dartmouth College Computer Science Technical Report TR2004-524 Available from [10 January 2008]. Borisov, et al (2001). Security of the WEP algorithm [Online] berkeley.edu. Available from < http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html > [10 January 2008]. Braun, T. et al (1999) Virtual Private Network Architecture [Online] CATI Charging and Accounting Technology for the Internet SNF SPP Projects 5003-054559/1 and 5003-054560/1 Available from [10 January 2008]. Geier, J. (2002) 802.11 WEP: Concepts and Vulnerability [Online] 80211Planet.com. Tutorials. Available from [10 January 2008] Klemencic, J. (2001) Basic Security Mechanisms for Wireless Networks [Online] Black Hat Europe Available from [10 January 2008]. Rigney, et al (1997). Remote Authentication Dial In User Service (RADIUS) [Online] Network Working Group. Available from [10 January 2008]. Welch, (2003) A Survey of 802.11a Wireless Security Threats and Security Mechanisms [Online] Information Technology and Operations Centre Department of Electrical Engineering and Computer Science United States Military Academy West Point, New York 10996. Technical Report ITOC-TR-2003-101 Available from [10 January 2008]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Wireless Security Mechanisms Essay Example | Topics and Well Written Essays - 1500 words, n.d.)
Wireless Security Mechanisms Essay Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1711332-wireless-security-mechanisms
(Wireless Security Mechanisms Essay Example | Topics and Well Written Essays - 1500 Words)
Wireless Security Mechanisms Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1711332-wireless-security-mechanisms.
“Wireless Security Mechanisms Essay Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1711332-wireless-security-mechanisms.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless Security Mechanisms

Zigbee Networks and Specifications

Researchers have been working on the development of wireless technologies for the automation of homes and different establishments.... Gohn (2007) stated that the advancement in the domain of wireless networking and information technology has made an age-old dream come true of automating one's house with a centralized source of control.... The innovative technology that is responsible for leaping wireless technology to another level of automation is known as Zigbee....
6 Pages (1500 words) Case Study

Wired Equivalent Privacy

During the setting up of a wireless network for business or home establishments, most people overlook the configuration of prerequisite wireless security feature.... During the setting up of a wireless network for business or home establishments, most people overlook the configuration of prerequisite wireless security feature.... Although these protection mechanisms are effective for physically controlled environment, the case is not the same for WLANs since the radio waves are not necessarily constrained by physical walls surrounding the network....
4 Pages (1000 words) Essay

Wireless Technology

Wireless technologies speed up data transmission and are more secure compared with hardware wired mechanisms.... Financial services professionals welcome the adoption of wireless technologies in the workplace, as long as the latter enhance the security of financial information in the organization and improve the availability of data for financial analysis and reporting.... That wireless technologies affect productivity is obvious: better communication and collaboration, constant access to business information, and improved security of data transmission add value to any business operation....
2 Pages (500 words) Essay

Product evaluation on bluetooth

Despite the apparent advantages, Bluetooth technology has also been reported to manifest the following disadvantages: (1) use of the same frequency as of the Wavelan standard; (2) in cases of presence of multiple users attempting exchange of information using the same technology, there is a need for the recipient to screen and indicate the acceptable source; (3) it was reported to include diverse security mechanisms to prevent violations of privacy and confidentiality (Neamo)....
2 Pages (500 words) Essay

Network Topology and Design Layout

For the sake of ABC company security, it is crucial that outsiders should not gain access to the internal CVS or internal WWW servers whatsoever.... In terms of security assumptions, it is important for the company to make its security appear good as argued by Cheswick et al (2003) that this is enough to deter attackers.... It is also important to make simple security arrangement since complex things are harder to comprehend and might even be nightmare to their designer (Cheswick et al, 2003, pp....
4 Pages (1000 words) Essay

Zigbee Networks and Specifications

This case study "Zigbee Networks and Specifications" presents Zigbee as a set of specifications that facilitate a low cost, low consumption power, low data transfer load, and non-complex wireless mesh network.... Researchers have been working on the development of wireless technologies for the automation of homes and different establishments.... Gohn (2007) stated that the advancement in the domain of wireless networking and information technology has made an age-old dream come true of automating one's house with a centralized source of control....
6 Pages (1500 words) Case Study

Penetration Testing and Advanced Hacking Techniques

hellip; Basically, a DOS attack is one of the most critical security threats in which an organization or individual is unable to access services that should be accessible in normal conditions.... ession hijacking is also a very common security threat in which an attacker takes control over the session of a Web user by secretly attaining the session ID and using their ID to demonstrate themselves as an owner of that ID....
7 Pages (1750 words) Case Study

The Major Security Threats

The paper 'The Major security Threats' presents computer and network security that has turned out to be a serious challenge for governments, organizations, and individuals.... Though, every day there emerge a large number of security tools, techniques, practices, guidelines.... hellip; At the present, security professionals apply a variety of penetration testing techniques to determine the security level of various applications....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us