SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-2, Feb- 2017]
https://dx.doi.org/10.24001/ijaems.3.2.11 ISSN: 2454-1311
www.ijaems.com Page | 63
An Overview of Wireless Local Area Networks
and Security System
Moumita Basak, Prof. Siladitya Sen
Department of Electronics and Communication Engineering, Heritage Institute of Technology, Kolkata, India
Abstract— Wireless Communication is one of the fastest
growing technologies in the world which is an application
of technology and science in the modern life. Radio and
telephone to current devices such as mobile phone, laptops,
television broadcasting are the most essential part of our
life. Wireless LAN, Cellular Telephony and Satellite based
communication networks are the several parts of the
wireless communication industry. In this paper, we have
emphasized on a study of Wireless LAN technologies and its
concerned issues: Wireless Networking, What WLANs are,
History of WLAN, Need of WLAN, Types of WLAN,
Advantages of WLAN, IEEE 802.11 Standards, Network
Security.
Keywords— WLAN, IEEE 802.11 Standard, some risks
and attacks, Network Security.
I. INTRODUCTION
Wireless Local Area Network: A Wireless LAN is a
wireless computer network that connects two or more
devices using radio frequency channels as their physical
medium within a limited area, such as home, office, school,
computer laboratory etc. WLANs are the popularly
increasing wireless networks which provide the network
services without connecting with wires or cables is very
difficult and too expensive to lay cabling for a wireless
network.
Access points and Network interface cards are two basic
components of WLAN. The stationary nodes are called
Access Point which concerns with coordination of
communication between the nodes and exchange the
information by means of antenna in the WLAN. In a
WLAN, Access Points can transmit and receive data. A
Network Interface card scans available frequency spectrum
from the environment and normally connects a wireless
station to the access point in the Wireless LAN.
II. HISTORY OF WIRELESS LOCAL AREA
NETWORK
Guglielmo Marconi invented the world’s first wireless radio
communication system in 1897. In 1901, he successfully
demonstrated his wireless telegraph system to the world by
transmitting radio signals across the Atlantic Ocean from
England to America, covering more than 1,700 miles [1].
In 1971 world’s first wireless computer communication
network was developed by Norman Ambramson, professor
at University of Hawaii. Costly hardware part of WLAN
was replaced by various versions of IEEE 802.11 Standards
at the end of the 1990’s. At the beginning of 1991,
HYPERLAN/1 was pursued and was approved in 1996.
In the year of 2000, HYPERLAN/2 was approved. IEEE
802.11n was invented and added to the IEEE 802.11
Standard which operates in both 2.4 GHz and 5 GHz.
III. REQIREMENTS OF WLAN
The medium access control protocol should be as efficient
as possible which can maximize the throughput.
 Hundreds of nodes should be needed.
 Service area of WLAN is 100 to 300m.
 Battery power consumption should be less in sleep
mode.
 WLAN provides secured license free operation.
 Reliable transmission and security is provided.
 Desired Quality of Service is required.
IV. TYPES OF WLAN
There are three types of WLANs-
 Infrared (IR) LANs-
 Infrared LANs are basically used at home for various
remote control devices.
 It is bounded in a single room because it cannot
penetrate the opaque walls.
 These LANs are inexpensive and simple to design.
 Spread Spectrum LANs-
 Topology can be either hub or peer to peer.
 It operates in ISM (Industrial, Scientific and Medical)
bands.
 The major function of hub is automatic handoff of
mobile stations.
 FCC licensing is not required.
 Narrowband microwave-
 These types of LANs can operate at microwave
frequencies and do not use spread spectrum.
 It needs FCC licensing for some products.
V. ADVANTAGES OF WLAN
 Flexibility and mobility is greater advantage of WLAN.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-2, Feb- 2017]
https://dx.doi.org/10.24001/ijaems.3.2.11 ISSN: 2454-1311
www.ijaems.com Page | 64
 WLANs are very easy to install because there is no
need of cable or wire connection.
 Portability is another advantage of WLAN.
 Maintenance cost is less. So it is less expensive.
VI. IEEE 802.11 STANDARDS
IEEE 802.11 Standard was developed and released by IEEE
group for Wireless Local Area Networking in the year of
1997 (Cisco Wireless LAN standard report, 2000). Initially
this standard specifies 2.4 GHz operating frequency,
defining 1 Mbps and 2 Mbps speeds. IEEE 802.11 standard
focuses on two layers of OSI Model- Physical Layer and
MAC Layer. In September 1999, IEEE added two initial
802.11 Standard- Highly Scalable WLAN 802.11a which
operates in the 5 GHz band at data rates up to 54 Mbps and
802.11b included two higher speeds (5.5 and 11 Mbps) to
802.11. IEEE 802.11g also operates at the 2.4 GHz ISM
(Industrial, Scientific and Medical) band at data rates up to
54 Mbps.
IEEE 802.11 standard support two modes of WLAN-
 Ad Hoc mode- It supports peer to peer connection.
Access point is not required. Full mesh or partial mesh
topology is built.
 Infrastructure mode- In this mode of operation at
least one access point is needed to communicate
between two nodes.
IEEE 802.11 supports three physical layer specifications for
wireless local area network: Diffused Infrared (IR),
Frequency Hopping Spread Spectrum (FHSS), Direct
Sequence Spread Spectrum (DSSS) where Infrared operates
at the 5 GHz band and other two operate at the ISM
(Industrial, scientific and medical) band 2.4 GHz.
Table.1: IEEE 802.11a, 802.11b, 802.11g standards
IEEE 802.11 supports two types of access protocols in
MAC layer: Distributed Access Protocol and Centralized
Access Protocol. In Distributed Access Protocol, there is no
central coordination, network is distributed in manner. It
acts as an Ad Hoc Wireless Network. In Centralized Access
Protocol, there is a central base station which connects a
number of wireless stations.
VII. NETWORKING SECURITY
Networking security is the most important part in the
Wireless LAN technology. To avoid the attacks and risks, a
security protocol for Wireless LAN should satisfy the
following properties:
 Confidentiality- The sender sends the data to the
intended receiver and it is ensured that the message is
comprehensible only by the intended receiver. It
prevents the unauthorized usage and access to the
network. For example, confidentiality ensures that an
unauthorized user cannot derive any useful information
about the person’s passwords and security number.
Data encryption ensures the confidentiality mechanism.
 Integrity- The security mechanism ensures that the
message sent by the sender to the receiver or
destination is unaltered. The unauthorized users cannot
insert, delete, destroy and modify the data.
 Availability- Availability is the security protocol which
ensures that the network must perform without any
interruption. It should provide the guaranteed services
and have the ability to tolerate the link failure as well as
several attacks by the unauthorized individuals.
 Non-repudiation- This security mechanism ensures
that the sender cannot deny of sending its message and
the receiver cannot deny of receiving its message.
Digital signature is the example of Non-repudiation.
 Encryption and Authentication- Encryption and
authentication provide the ultimate security to the
Wireless LAN technology. Wired Equivalent Privacy
(WEP) and Wi-Fi Protected Access (WPA) are the
popular encryption methods in WLAN. Open
Authentication, Shared Authentication and Expandable
Authentication Protocol (EAP) are the popular
authentication mechanisms.
VIII. GENERAL ATTACKS AND RISKS TO
WLAN TECHNOLOGY
An attack is an action taken to destroy, expose and alter the
information or data by unauthorized users in the network.
Unlike the wired network, WLAN uses radio waves for
communication; these actions have an intention to do harm.
Attacks can be generally categorized in two types:
 Passive attack
 Active attack
Passive attack is the attempt made by the malicious nodes to
obtain the information during transmission and reception
without disrupting the network. Passive attacks are very
difficult to detect as the operation of the network is not
modified or altered by the attackers. Passive attacks can be
classified as: Traffic analysis attack and Eavesdropping.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-2, Feb- 2017]
https://dx.doi.org/10.24001/ijaems.3.2.11 ISSN: 2454-1311
www.ijaems.com Page | 65
Active attacks are those types of attack in which attackers
can alter the information or contents on the target and
disrupt the operation of the network. Those active attacks
are performed at the same network are known as internal
attacks and those are performed outside the network are
known as external attacks.
There are several attacks that can damage the WLAN. Some
of them are as follows:
 Denial-of-Service
 Man in the Middle attack
 Spoofing and Session High jacking
 Eavesdropping
 Attack on Service Set Identifier
 Jamming
1. Denial-of-service
In this type of attack, the attacker floods the network with
inconsistent data, packet, valid or in valid messages to put
the burden on the resources and stop the utilization of the
resources for the nodes which are present in the network.
Thus the network is no longer operating as previously. This
may lead to the failure of the delivery which was guaranteed
to the end users. Due to the relatively low bit rates of
WLAN, can leave them to open Denial-of-Service attacks.
This illustrates the need for availability mechanism.
2. Man in the Middle attack
A Man in the Middle attack is the type of attack where the
unauthorized user or attacker positions between the sender
and the receiver in such a way that the attacker can read,
intercept, modify and retransmit data to the intended
receiver. Thus it breaks the integrity and confidentiality of
data. This illustrates the need for integrity mechanism.
3. Spoofing and Session High jacking
In this form of attack, the attacker modifies the MAC
address and acts as the valid access point. The attacker gets
the license to access on the network and various resources
such as printers, servers etc by assuming the identity of the
valid user in the network as the 802.11 networks do not
provide any authentication to the MAC address frame.
Hence the MAC addresses are spoofed by the attacker and
high jack the session.
4. Eavesdropping
This kind of attack refers to the reception of the message by
an attacker. An unauthorized individual gain the access to
the network, read the private data that is being transmitted
across the network. Wireless LANs radiate network into
space. This makes it impossible to control who can receive
signals in any wireless LAN installation. Hence, the
eavesdropping by third parties enables the attacker to
intercept the transmission over the air from a distance [2].
Eavesdropping can be prevented by using confidentiality
measures.
5. Attack on Service Set Identifier
Service Set Identifier refers to the identification of a
network that provides the communication between the client
and an appropriate access point. The access point was
released in the market with the valid SSID and password.
Hence, SSID provides a password authentication
mechanism which makes the wireless local area network
secured. There are two modes in SSID: open mode and
closed mode. In open mode, SSID of access point is
broadcasted and any network can connect in the public
domain whereas in closed mode, the proper authentication is
provided.
6. Jamming
Jamming attack can be introduced as international
interference attacks due to the spontaneous emission of
radio frequency signal in the MAC and the Physical layer of
wireless networks. The attacker can interfere with legitimate
traffic and could employ jamming signals which disrupts
the ongoing transmission of the wireless channel. The main
objective of the jamming is to block the reception of
messages. Jamming attacks can be overcome by Frequency
Hopping Spread Spectrum and Direct Sequence Spread
Spectrum technique.
IX. CONCLUSION
In this paper, we have discussed about the Wireless LAN
technology and its security system. In modern days WLAN
is an important ongoing process as it becomes more
popular, flexible and the ultimate solution of the
communication system. Wireless LAN bears some
advantages but every wireless protocol has some demerits.
When this technology was introduced, hackers searched for
security vulnerable, they exploit those vulnerabilities.
Hackers cannot be eliminated. Hence, the organizations can
mitigate these security problems of WLAN with proper
planning, implementation, and management, constant
maintenance and development of wireless standards.
REFERENCES
[1] “Ad Hoc Wireless Networks – Architectures and
Protocols”- C. Siva Ram Murthy and B.S. Manoj
[2] R.A. Hamid, Wireless LAN: Security Issues and
Solutions [Press release], 2003
[3] Stallings, Wireless Communication and Networks.
[4] http://www.cs.mun.ca/~yzchen/bib/80211_whitepaper.
pdf
[5] http://www.sans.org/reading-
room/whitepapers/wireless-lan-security-issues-
solutions-1009
[6] WLAN Security Issues and Solutions by Deepika
Dhiman
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-2, Feb- 2017]
https://dx.doi.org/10.24001/ijaems.3.2.11 ISSN: 2454-1311
www.ijaems.com Page | 66
http://www.iosrjournals.org/iosr-jce/papers/Vol16-
issue1/Version-4/J016146775.pdf
[7] Wireless LAN Security Threats and Vulnerabilities: a
Literature review
https://thesai.org/Downloads/Volume5No1/Paper_25-
Wireless_LAN_Security_Threats_Vulnerabilities.pdf
[8] https://arxiv.org/ftp/arxiv/papers/1303/1303.1882.pdf

More Related Content

What's hot

Project report a dhoc wireless network
Project report a dhoc wireless networkProject report a dhoc wireless network
Project report a dhoc wireless networkShiza Kokab
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Secure communications over wireless broadcast networks
Secure communications over wireless broadcast networksSecure communications over wireless broadcast networks
Secure communications over wireless broadcast networkspraveen369
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless networkElanthendral Mariappan
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technologypriyankpatel2811
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyClayton Hatathlie
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackRashi Dhagat
 

What's hot (20)

Project report a dhoc wireless network
Project report a dhoc wireless networkProject report a dhoc wireless network
Project report a dhoc wireless network
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Security issues
Security issuesSecurity issues
Security issues
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
50120140507012
5012014050701250120140507012
50120140507012
 
Wireless
WirelessWireless
Wireless
 
Secure communications over wireless broadcast networks
Secure communications over wireless broadcast networksSecure communications over wireless broadcast networks
Secure communications over wireless broadcast networks
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Pan
PanPan
Pan
 
JCC_2015120915212763
JCC_2015120915212763JCC_2015120915212763
JCC_2015120915212763
 

Viewers also liked

Gost r 53909 2010
Gost r 53909 2010Gost r 53909 2010
Gost r 53909 2010Raphael254
 
Tarea 5. controladores antonio rodriguez
Tarea 5. controladores    antonio rodriguezTarea 5. controladores    antonio rodriguez
Tarea 5. controladores antonio rodriguezlicett lopez
 
Mental  Health  program
Mental  Health  programMental  Health  program
Mental  Health  programbcole13
 
Презентація:Математичне лото (додавання звичайних дробів)
Презентація:Математичне лото (додавання звичайних дробів)Презентація:Математичне лото (додавання звичайних дробів)
Презентація:Математичне лото (додавання звичайних дробів)sveta7940
 
RATED PG 4 - NOW WHAT - PS. ALAN ESPORAS - 10AM MORNING SERVICE
RATED PG 4 - NOW WHAT - PS. ALAN ESPORAS - 10AM MORNING SERVICERATED PG 4 - NOW WHAT - PS. ALAN ESPORAS - 10AM MORNING SERVICE
RATED PG 4 - NOW WHAT - PS. ALAN ESPORAS - 10AM MORNING SERVICEFaithworks Christian Church
 
How I Hacked Your Wireless LAN � And How to Stop Me
How I Hacked Your Wireless LAN � And How to Stop MeHow I Hacked Your Wireless LAN � And How to Stop Me
How I Hacked Your Wireless LAN � And How to Stop Medigitallibrary
 
Local area network
Local area networkLocal area network
Local area networkSEDYK
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 

Viewers also liked (15)

Gost r 53909 2010
Gost r 53909 2010Gost r 53909 2010
Gost r 53909 2010
 
Tarea 5. controladores antonio rodriguez
Tarea 5. controladores    antonio rodriguezTarea 5. controladores    antonio rodriguez
Tarea 5. controladores antonio rodriguez
 
Mental  Health  program
Mental  Health  programMental  Health  program
Mental  Health  program
 
Презентація:Математичне лото (додавання звичайних дробів)
Презентація:Математичне лото (додавання звичайних дробів)Презентація:Математичне лото (додавання звичайних дробів)
Презентація:Математичне лото (додавання звичайних дробів)
 
Aporte Individual - MIRS
Aporte Individual - MIRSAporte Individual - MIRS
Aporte Individual - MIRS
 
A.antenucci resume
A.antenucci resumeA.antenucci resume
A.antenucci resume
 
RATED PG 4 - NOW WHAT - PS. ALAN ESPORAS - 10AM MORNING SERVICE
RATED PG 4 - NOW WHAT - PS. ALAN ESPORAS - 10AM MORNING SERVICERATED PG 4 - NOW WHAT - PS. ALAN ESPORAS - 10AM MORNING SERVICE
RATED PG 4 - NOW WHAT - PS. ALAN ESPORAS - 10AM MORNING SERVICE
 
How I Hacked Your Wireless LAN � And How to Stop Me
How I Hacked Your Wireless LAN � And How to Stop MeHow I Hacked Your Wireless LAN � And How to Stop Me
How I Hacked Your Wireless LAN � And How to Stop Me
 
Introduction to the DOM
Introduction to the DOMIntroduction to the DOM
Introduction to the DOM
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Wireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek KominfoWireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek Kominfo
 
Local area network
Local area networkLocal area network
Local area network
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 

Similar to an overview of wireless local area networks and security system

Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...IJCSIS Research Publications
 
Comparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanComparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanIAEME Publication
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless securitySarath K Sukumar
 
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxComposition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxdonnajames55
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfJOMan21
 
A Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksA Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksScott Bou
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...FaizanMahmood28
 
Review and Analysis of WiMAX Technology using different Modulation scheme wit...
Review and Analysis of WiMAX Technology using different Modulation scheme wit...Review and Analysis of WiMAX Technology using different Modulation scheme wit...
Review and Analysis of WiMAX Technology using different Modulation scheme wit...ijtsrd
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor NetworksDr. Amarjeet Singh
 
Wireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyWireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyRAVIKIRAN ANANDE
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networksSweta Kumari Barnwal
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Securityijtsrd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Similar to an overview of wireless local area networks and security system (20)

Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
 
1Table of Contents.docx
1Table of Contents.docx1Table of Contents.docx
1Table of Contents.docx
 
Comparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanComparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlan
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
 
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxComposition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
 
J010216776
J010216776J010216776
J010216776
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdf
 
A Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksA Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless Networks
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...
 
Review and Analysis of WiMAX Technology using different Modulation scheme wit...
Review and Analysis of WiMAX Technology using different Modulation scheme wit...Review and Analysis of WiMAX Technology using different Modulation scheme wit...
Review and Analysis of WiMAX Technology using different Modulation scheme wit...
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor Networks
 
Wireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyWireless LAN and bluetooth technology
Wireless LAN and bluetooth technology
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
A044060107
A044060107A044060107
A044060107
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Security
 
I05225564
I05225564I05225564
I05225564
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

an overview of wireless local area networks and security system

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-2, Feb- 2017] https://dx.doi.org/10.24001/ijaems.3.2.11 ISSN: 2454-1311 www.ijaems.com Page | 63 An Overview of Wireless Local Area Networks and Security System Moumita Basak, Prof. Siladitya Sen Department of Electronics and Communication Engineering, Heritage Institute of Technology, Kolkata, India Abstract— Wireless Communication is one of the fastest growing technologies in the world which is an application of technology and science in the modern life. Radio and telephone to current devices such as mobile phone, laptops, television broadcasting are the most essential part of our life. Wireless LAN, Cellular Telephony and Satellite based communication networks are the several parts of the wireless communication industry. In this paper, we have emphasized on a study of Wireless LAN technologies and its concerned issues: Wireless Networking, What WLANs are, History of WLAN, Need of WLAN, Types of WLAN, Advantages of WLAN, IEEE 802.11 Standards, Network Security. Keywords— WLAN, IEEE 802.11 Standard, some risks and attacks, Network Security. I. INTRODUCTION Wireless Local Area Network: A Wireless LAN is a wireless computer network that connects two or more devices using radio frequency channels as their physical medium within a limited area, such as home, office, school, computer laboratory etc. WLANs are the popularly increasing wireless networks which provide the network services without connecting with wires or cables is very difficult and too expensive to lay cabling for a wireless network. Access points and Network interface cards are two basic components of WLAN. The stationary nodes are called Access Point which concerns with coordination of communication between the nodes and exchange the information by means of antenna in the WLAN. In a WLAN, Access Points can transmit and receive data. A Network Interface card scans available frequency spectrum from the environment and normally connects a wireless station to the access point in the Wireless LAN. II. HISTORY OF WIRELESS LOCAL AREA NETWORK Guglielmo Marconi invented the world’s first wireless radio communication system in 1897. In 1901, he successfully demonstrated his wireless telegraph system to the world by transmitting radio signals across the Atlantic Ocean from England to America, covering more than 1,700 miles [1]. In 1971 world’s first wireless computer communication network was developed by Norman Ambramson, professor at University of Hawaii. Costly hardware part of WLAN was replaced by various versions of IEEE 802.11 Standards at the end of the 1990’s. At the beginning of 1991, HYPERLAN/1 was pursued and was approved in 1996. In the year of 2000, HYPERLAN/2 was approved. IEEE 802.11n was invented and added to the IEEE 802.11 Standard which operates in both 2.4 GHz and 5 GHz. III. REQIREMENTS OF WLAN The medium access control protocol should be as efficient as possible which can maximize the throughput.  Hundreds of nodes should be needed.  Service area of WLAN is 100 to 300m.  Battery power consumption should be less in sleep mode.  WLAN provides secured license free operation.  Reliable transmission and security is provided.  Desired Quality of Service is required. IV. TYPES OF WLAN There are three types of WLANs-  Infrared (IR) LANs-  Infrared LANs are basically used at home for various remote control devices.  It is bounded in a single room because it cannot penetrate the opaque walls.  These LANs are inexpensive and simple to design.  Spread Spectrum LANs-  Topology can be either hub or peer to peer.  It operates in ISM (Industrial, Scientific and Medical) bands.  The major function of hub is automatic handoff of mobile stations.  FCC licensing is not required.  Narrowband microwave-  These types of LANs can operate at microwave frequencies and do not use spread spectrum.  It needs FCC licensing for some products. V. ADVANTAGES OF WLAN  Flexibility and mobility is greater advantage of WLAN.
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-2, Feb- 2017] https://dx.doi.org/10.24001/ijaems.3.2.11 ISSN: 2454-1311 www.ijaems.com Page | 64  WLANs are very easy to install because there is no need of cable or wire connection.  Portability is another advantage of WLAN.  Maintenance cost is less. So it is less expensive. VI. IEEE 802.11 STANDARDS IEEE 802.11 Standard was developed and released by IEEE group for Wireless Local Area Networking in the year of 1997 (Cisco Wireless LAN standard report, 2000). Initially this standard specifies 2.4 GHz operating frequency, defining 1 Mbps and 2 Mbps speeds. IEEE 802.11 standard focuses on two layers of OSI Model- Physical Layer and MAC Layer. In September 1999, IEEE added two initial 802.11 Standard- Highly Scalable WLAN 802.11a which operates in the 5 GHz band at data rates up to 54 Mbps and 802.11b included two higher speeds (5.5 and 11 Mbps) to 802.11. IEEE 802.11g also operates at the 2.4 GHz ISM (Industrial, Scientific and Medical) band at data rates up to 54 Mbps. IEEE 802.11 standard support two modes of WLAN-  Ad Hoc mode- It supports peer to peer connection. Access point is not required. Full mesh or partial mesh topology is built.  Infrastructure mode- In this mode of operation at least one access point is needed to communicate between two nodes. IEEE 802.11 supports three physical layer specifications for wireless local area network: Diffused Infrared (IR), Frequency Hopping Spread Spectrum (FHSS), Direct Sequence Spread Spectrum (DSSS) where Infrared operates at the 5 GHz band and other two operate at the ISM (Industrial, scientific and medical) band 2.4 GHz. Table.1: IEEE 802.11a, 802.11b, 802.11g standards IEEE 802.11 supports two types of access protocols in MAC layer: Distributed Access Protocol and Centralized Access Protocol. In Distributed Access Protocol, there is no central coordination, network is distributed in manner. It acts as an Ad Hoc Wireless Network. In Centralized Access Protocol, there is a central base station which connects a number of wireless stations. VII. NETWORKING SECURITY Networking security is the most important part in the Wireless LAN technology. To avoid the attacks and risks, a security protocol for Wireless LAN should satisfy the following properties:  Confidentiality- The sender sends the data to the intended receiver and it is ensured that the message is comprehensible only by the intended receiver. It prevents the unauthorized usage and access to the network. For example, confidentiality ensures that an unauthorized user cannot derive any useful information about the person’s passwords and security number. Data encryption ensures the confidentiality mechanism.  Integrity- The security mechanism ensures that the message sent by the sender to the receiver or destination is unaltered. The unauthorized users cannot insert, delete, destroy and modify the data.  Availability- Availability is the security protocol which ensures that the network must perform without any interruption. It should provide the guaranteed services and have the ability to tolerate the link failure as well as several attacks by the unauthorized individuals.  Non-repudiation- This security mechanism ensures that the sender cannot deny of sending its message and the receiver cannot deny of receiving its message. Digital signature is the example of Non-repudiation.  Encryption and Authentication- Encryption and authentication provide the ultimate security to the Wireless LAN technology. Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are the popular encryption methods in WLAN. Open Authentication, Shared Authentication and Expandable Authentication Protocol (EAP) are the popular authentication mechanisms. VIII. GENERAL ATTACKS AND RISKS TO WLAN TECHNOLOGY An attack is an action taken to destroy, expose and alter the information or data by unauthorized users in the network. Unlike the wired network, WLAN uses radio waves for communication; these actions have an intention to do harm. Attacks can be generally categorized in two types:  Passive attack  Active attack Passive attack is the attempt made by the malicious nodes to obtain the information during transmission and reception without disrupting the network. Passive attacks are very difficult to detect as the operation of the network is not modified or altered by the attackers. Passive attacks can be classified as: Traffic analysis attack and Eavesdropping.
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-2, Feb- 2017] https://dx.doi.org/10.24001/ijaems.3.2.11 ISSN: 2454-1311 www.ijaems.com Page | 65 Active attacks are those types of attack in which attackers can alter the information or contents on the target and disrupt the operation of the network. Those active attacks are performed at the same network are known as internal attacks and those are performed outside the network are known as external attacks. There are several attacks that can damage the WLAN. Some of them are as follows:  Denial-of-Service  Man in the Middle attack  Spoofing and Session High jacking  Eavesdropping  Attack on Service Set Identifier  Jamming 1. Denial-of-service In this type of attack, the attacker floods the network with inconsistent data, packet, valid or in valid messages to put the burden on the resources and stop the utilization of the resources for the nodes which are present in the network. Thus the network is no longer operating as previously. This may lead to the failure of the delivery which was guaranteed to the end users. Due to the relatively low bit rates of WLAN, can leave them to open Denial-of-Service attacks. This illustrates the need for availability mechanism. 2. Man in the Middle attack A Man in the Middle attack is the type of attack where the unauthorized user or attacker positions between the sender and the receiver in such a way that the attacker can read, intercept, modify and retransmit data to the intended receiver. Thus it breaks the integrity and confidentiality of data. This illustrates the need for integrity mechanism. 3. Spoofing and Session High jacking In this form of attack, the attacker modifies the MAC address and acts as the valid access point. The attacker gets the license to access on the network and various resources such as printers, servers etc by assuming the identity of the valid user in the network as the 802.11 networks do not provide any authentication to the MAC address frame. Hence the MAC addresses are spoofed by the attacker and high jack the session. 4. Eavesdropping This kind of attack refers to the reception of the message by an attacker. An unauthorized individual gain the access to the network, read the private data that is being transmitted across the network. Wireless LANs radiate network into space. This makes it impossible to control who can receive signals in any wireless LAN installation. Hence, the eavesdropping by third parties enables the attacker to intercept the transmission over the air from a distance [2]. Eavesdropping can be prevented by using confidentiality measures. 5. Attack on Service Set Identifier Service Set Identifier refers to the identification of a network that provides the communication between the client and an appropriate access point. The access point was released in the market with the valid SSID and password. Hence, SSID provides a password authentication mechanism which makes the wireless local area network secured. There are two modes in SSID: open mode and closed mode. In open mode, SSID of access point is broadcasted and any network can connect in the public domain whereas in closed mode, the proper authentication is provided. 6. Jamming Jamming attack can be introduced as international interference attacks due to the spontaneous emission of radio frequency signal in the MAC and the Physical layer of wireless networks. The attacker can interfere with legitimate traffic and could employ jamming signals which disrupts the ongoing transmission of the wireless channel. The main objective of the jamming is to block the reception of messages. Jamming attacks can be overcome by Frequency Hopping Spread Spectrum and Direct Sequence Spread Spectrum technique. IX. CONCLUSION In this paper, we have discussed about the Wireless LAN technology and its security system. In modern days WLAN is an important ongoing process as it becomes more popular, flexible and the ultimate solution of the communication system. Wireless LAN bears some advantages but every wireless protocol has some demerits. When this technology was introduced, hackers searched for security vulnerable, they exploit those vulnerabilities. Hackers cannot be eliminated. Hence, the organizations can mitigate these security problems of WLAN with proper planning, implementation, and management, constant maintenance and development of wireless standards. REFERENCES [1] “Ad Hoc Wireless Networks – Architectures and Protocols”- C. Siva Ram Murthy and B.S. Manoj [2] R.A. Hamid, Wireless LAN: Security Issues and Solutions [Press release], 2003 [3] Stallings, Wireless Communication and Networks. [4] http://www.cs.mun.ca/~yzchen/bib/80211_whitepaper. pdf [5] http://www.sans.org/reading- room/whitepapers/wireless-lan-security-issues- solutions-1009 [6] WLAN Security Issues and Solutions by Deepika Dhiman
  • 4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-2, Feb- 2017] https://dx.doi.org/10.24001/ijaems.3.2.11 ISSN: 2454-1311 www.ijaems.com Page | 66 http://www.iosrjournals.org/iosr-jce/papers/Vol16- issue1/Version-4/J016146775.pdf [7] Wireless LAN Security Threats and Vulnerabilities: a Literature review https://thesai.org/Downloads/Volume5No1/Paper_25- Wireless_LAN_Security_Threats_Vulnerabilities.pdf [8] https://arxiv.org/ftp/arxiv/papers/1303/1303.1882.pdf