Wireless local area networks Essay

Abstraction:

Wireless webs have exhibited important growing within the last few old ages in both place and corporate environments due in portion to low cost and increased hardware quality. IEEE 802.11 radio LAN ( WLAN ) is the most widely usedWLAN criterion today, but it can non supply QoS support for the increasing figure of multimedia application. This growing has fueled new applications for radio webs runing from advanced warehouse stock list systems to wireless voice over cyberspace protocol ( VoIP ) phones.Wireless local country webs ( LAN ‘s ) besides referred to as Wi-Fi since their debut in the mid 1980s they have proliferated among users and have taken over administrations. Their wired opposite numbers and wireless LANs are prone to security exposures. Most of these so called exposures exist merely because adequate attention is non taken to guarantee that there is strong seccurity in topographic point. In this paper, we have studied about the most of the exposures that can be for all types of LAN systems. This besides describes where the exposures reside ; methods used to observe and procure them. This paper describes an iterative procedure for concern hazard analysis, exposure designation, and menace redress.

Keywords: IEEE 802.11, Wireless LAN ( WLAN ) , Medium Access Control ( MAC ) , Quality of Service ( QoS )

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Introduction:

Wireless LAN security has come a long manner since the early yearss and the negative promotion around the defects of WEP. Recent progresss in WLAN engineering and the confirmation of cardinal wireless security criterions are giving CIOs and web decision makers the high degree of assurance in WLAN security that they have ever needed. In its simplest signifier radio LAN can be thought of as two or more unwired computing machines utilizing the airwaves for typical computing machine intents, with the aid of an entree point.

Problem Statement:

Security on radio local country webs ( WLANs ) is a demand in today ‘s rapid deployment of this engineering. To turn to this job, measurings were conducted on a trial bed web to find some of the operating expense associated with radio web security. Much of this research focuses on the throughput decrease of webs caused by advanced encoding strategies prevalent in many of today ‘s corporate webs in add-on to the hallmark methods those webs implement. For accomplishing an effectual connectivity, WLAN security must turn to three critical countries ;

  • Data Confidentiality and Integrity,
  • Authentication and Access Control, and
  • Intrusion Detection and Prevention

WLAN Vulnerabilities:

All webs are vulnerable, but in wired webs, physical barriers cut down hazard by restricting media entree. There are several known exposures that occur largely because of the very nature of LAN, which use wireless frequences to allow transmittal of informations over the airwaves.The most normally known exposures are:

  • Inability to Control Access
  • Lack of Confidentiality
  • Unauthorized Network Use
  • Forged Messages
  • Denial of Service
  • Vulnerable Stations
  • Rouge Access Points
  • MAC Address Filtering

The Current State of WLAN Security:

Even after a decennary of handiness and promising commercial successes, security remains the figure one concern for endeavor WLAN deployments. Harmonizing to Joanie Wexler ‘s 2007 WLAN State-of-the Market study, merely over half ( 53 % ) of the planetary respondents identified security issues as their primary concern. The good intelligence is that this is a important lessening from the 2006 survey where over 70 % of respondents were concerned about WLAN security. Much of the trepidation over WLAN security was due to the nature of WiFi. The 802.11 criterion – besides known as Wireless Ethernet – is based on the rule of a shared medium. While most directors have felt comfy plenty with the fact that they can physically procure their wired networking medium, their LAN, they were less comfy when the web medium is the unfastened air. There was a general perceptual experience that WLANs are inherently insecure, and early executions reinforced this impression through well-publicized exposures and onslaughts. This perceptual experience has been a major job that has kept some web directors from implementing radio LANs wholly.

Purpose:

My purpose of the undertaking is to analyse and research on the recent tendencies in WLAN engineerings, pull offing a radio LAN web, researching on the hazards and exposures involved. This undertaking besides faces a challenge to develop programs to see when deploying a LAN. It involves supplying a solution for the security jobs faced by radio LAN. It besides analyses and attemps to analyze the security mechanism provided by implementing a firewall for radio webs.

Aim:

My chief aim is to analyze and research about present wired/wireless web engineerings. Here, the chief focal point is to analyse the process behind effectual direction of radio webs. I besides tried to analyze the assorted hazards and exposures involved in a WLAN and happening appropriate solutions for efective communicating. My undertaking has been allocated into assorted undertakings as shown below:

  • Analyzing the present engineering which implements WLAN engineerings and its direction.
  • Measuring the mechanism involved behind puting up a secured WLAN.
  • Discoursing about the security issues and exposures involved in radio webs.
  • Implementing and measuring assorted encoding criterions which can supply security to WLAN and besides discoursing the mechanism for implementing a firewall to do the WLAN networks secure.

Literature Reappraisal:

The 802.11WLANtechnologies provide people with omnipresent communicating and calculating environment in offices, infirmaries, campuses etc. These applications include streaming media, synergistic coaction, videoconferencing and downloadable content such as multimedia messaging. However, multimedia applications require a certain quality of service ( QoS ) support such as guaranteed bandwidth, hold, and jitter and mistake rate. Guaranting those QoS demands is a disputing undertaking with respect to 802.11WLANprotocols and Medium Access Control ( MAC ) maps. Wireless webs have proven their ability to direct informations at higher rates and robust in so many environments. However, supplying QoS and security is still a ambitious undertaking. Several proposals have been presented in order to heighten the public presentation, overcome exposures and supplying warrant QoS in IEEE 802.11e in order to convey informations those needed high bandwidth in add-on with their hold sensitive nature.

Mentions:

  1. “ Wi-Fi: The Standard for Wireless Fidelity, ” Wireless Ethernet Compatibility Alliance ( WECA ) Ltd [ Online ] . Available: hypertext transfer protocol: //www.wirelessethernet.org
  2. “ Wi-Fi System Interoperability Test Plan, Version 1.0, ” Wireless Ethernet Compatibility Alliance, February 2000. [ Online ] . Available: hypertext transfer protocol: //www.wirelessethernet.org
  3. W. A. Arbaugh, N. Shankar, and Y.J. Wan, “ Your 802.11 radio web has no apparels, ” University of Maryland, College Park, Maryland, March 2001. [ Online ] . Available: hypertext transfer protocol: //www.cs.umd.edu/~waa/wireless.pdf
  4. J. R. Walker, “ Unsafe at any cardinal size: An analysis of the WEP encapsulation, ” Intel Corp. , Hillsboro, OR, October 2000. Doc. : IEEE 802.11-00/362. [ Online ] . Available: hypertext transfer protocol: //grouper.ieee.org/groups/802/11/Documents/DocumentHolder/0-362.zip
  5. J. R. Walker, “ Overview of 802.11 Security, ” Intel Corp. , Hillsboro, OR, March 2000. Doc. : IEEE 802.15-01/154. [ Online ] Available: hypertext transfer protocol: //grouper.ieee.org/groups/802/15/pub/2001/Mar01/01154r0P802-15_TG3-Overview-of-80211-Security.ppt
  6. W. A. Arbaugh, “ An inductive chosen plaintext onslaught against WEP/WEP2, ” University of Maryland, College Park, Maryland, May 2001. Doc. : IEEE 802.11-01/230r1. [ Online ] . Available: hypertext transfer protocol: //grouper.ieee.org/groups/802/11/Documents/DocumentHolder/1-230.zip
  7. S. Fluhrer, I. Mantin, A. Shamir, “ Weakness in the Key Scheduling Algorithm of RC4. ” Eighth Annual Workshop on Selected Areas in Cryptography, August 2001.
  8. “ Network Stumbler, ” package. [ Online ] Available: hypertext transfer protocol: //www.netstumbler.com