Wireless Network Security
Wirelesstechnologies, in thesimplest sense, enableoneor more
devicesto communicatewithout physical connections
WirelessWideAreaNetworks(WWAN), WLANs, and
WirelessPersonal AreaNetworks(WPAN). WWAN includeswide
coverageareatechnologiessuch as2G cellular, Cellular Digital Packet
Data(CDPD), Global System for MobileCommunications(GSM).
WLAN, representing wirelesslocal areanetworks, includes802.11
and several others.
Personal Digital Assistants(PDA)
IEEE 802.11 (bandwidth up to 2 Mbps)
IEEE 802.11b (bandwidth up to 11 Mbps)
IEEE 802.11a (bandwidth up to 54 Mbps)
IEEE 802.11g (bandwidth up to 54 Mbps)
IEEE 802.11n (support dataratesof over 100 Mbps)
Wireless Security Threats
Potential threatsin wirelessnetworksaredevicetheft, denial of
service, malicioushackers, maliciouscode, theft of service, and
industrial and foreign espionage.
1.Loss of Confidentiality
2.Loss of Integrity
3.Loss of Network Availability
Access Point Configuration
* Updating default passwords
* Establishing proper encryption settings
* Controlling thereset function
* Using MAC ACL functionality
* Disablebroadcast SSID feature
* Changing default channel.
* Using DHCP.
Resources on public wireless networks have a higher
risk of attack since they generally do not have the
same degree of protection as internal resources.
Personal firewalls offersome protection against
certain attacks. Personal firewalls are software-based
solutions that reside on a client's machine
Intrusion Detection System (IDS)
An intrusion detection system is an effective tool for
determining whetherunauthorized users are
attempting to access, have already accessed, orhave
compromised the network.
Generally have only two encryption settings
available: 40-bit shared key, and 104-bit setting.
Security assessments, or audits, arean essential tool for
checking thesecurity postureof aWLAN and for
determining correctiveaction to makesureit remains
Hardware countermeasures formitigating
WLAN risks include implementing smart
cards, VPNs, PKI, biometrics, and other
Smart cards may add anotherlevel of
protection, although they also add another
layerof complexity. Agencies can use smart
cards in conjunction with username or
Public Key Infrastructure (PKI)
PKI providestheframework and servicesfor thegeneration,
production, distribution, control, and accounting of public key
certificates. It providesapplicationswith secureencryption and
authentication of network.
Biometric devicesincludefingerprint/palm-print scanners,
optical scanners(including retinaand irisscanners), facial
recognition scanners, and voicerecognition scanners.
Biometricsprovidean added layer of protection.
In this case study, we have reviewed wireless
network security issues in trust, management,
interoperation and measurement and have identified
a numberof open Critical issues in management of
security relationships in public access networks
2.protection of incentiveinformation and lightweight key
3.compromised nodedefensethrough redundancy and
consistency checking and moreefficient public-key schemes.