SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



                                   WI-FI Security by using Proxy server
                                              Promila1, Dr.R.S.Chhillar2
                         1, 2
                                Department of Computer Science and Application, M. D. U. Rohtak, India




Abstract:
With the whole world going mobile, data security remains the biggest challenge. Critical data (Business and Safety related) is
lying on storage medium on a computer which is connected to hundreds of thousands of computers via internet. Wi-Fi uses a
radio frequency to transmit data. Any user with a transceiver can connect to the network, if not properly secured. Use of the
mobile networking is on rise and 60% of these are unsecured, risk of external threat is very high. A structured thread by an
experienced hacker with malicious intent can get hold of user account and use it to access mission critical data. Thus it is of
utmost importance to secure a Wi-Fi network. Stringent security policies must be followed. Multiple lever of security shall be
put in place.

Keywords: AES, DAIR, MAC, Proxy server, TKIP, WEP, WPA.

1. Introduction:
WI-FI:-
 WI-FI stands for "Wireless Fidelity". Wi-Fi refers to wireless networking technology that allows computers and other devices
to communicate over a wireless signal. Wi-Fi is a term for certain types of wireless local area network (WLAN) that use
specifications in the 802.11 family. The term Wi-Fi was created by an organization called the Wi-Fi Alliance, which oversees
tests that certify product interoperability. A product that passes the alliance tests is given the label "Wi-Fi certified" (a
registered trademark).
Originally, Wi-Fi certification was applicable only to products using the 802.11b standard. Today, Wi-Fi can apply to products
that use any 802.11 standard. The 802.11 specifications are part of an evolving set of wireless network standards known as the
802.11 family. The particular specification under which a Wi-Fi network operates is called the "flavor" of the network. Wi-Fi
has gained acceptance in many businesses, agencies, schools, and homes as an alternative to a wired LAN. Many airports,
hotels, and fast-food facilities offer public access to Wi-Fi networks.




                                                        “Figure1. Wi-fi logo”
Proxy server:-
A proxy server acts as an intermediary between websites and web browsers. Web browsers are configured to use a proxy
server instead of accessing websites directly on the internet. A proxy server acts as a middleman between two networks. One
network is typically the public Internet, the other is often a group of client computers sharing a single Internet connection. The
primary remaining uses of a proxy server are to protect the privacy of systems behind the server, and to speed up Internet
access through caching. However since the proxy can be configured not just to direct data ,but to change it en route,there are
many potential uses. A proxy server caches frequently accessed data. If a web browser requests cached data, the proxy server
can retrieve it quickly instead of making another request across the Internet, which is slower. A network can be configured so
that the only way to reach the Internet is through a proxy server that allows only authorized users who have an account.
Types of proxy server:-
     1. Forward proxy: -A forward proxy takes request from an internal network and forwarding them to the Internet.




                                                     “Figure2. Forward proxy “

Issn 2250-3005(online)                                        September| 2012                                   Page 1408
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



    1. Open proxy: - An open proxy forwards request from and to anywhere on the Internet.




                                                  “Figure3. Open proxy “
    2. Reverse proxy:-A reverse proxy taking request from the Internet and forwards them to servers in an internal
         network. Those making requests connect to the proxy and may not be aware of the internal network.




                                                 “Figure4. Reverse proxy “
2. Related Work
10 tips of WI-FI security:-These tips are given by Chad Perrin in 2007

    1.  Use a strong password.
    2.  Don’t broadcast your SSID:- Serious security crackers who know what they are doing will not be deterred by a
        hidden SSID — the “name” you give your wireless network
    3. Use good wireless encryption.
    4. Use another layer of encryption when possible.
    5. Restrict access by MAC access.
    6. Shut down the network when it is not being used.
    7. Shut down your wireless network interface, too.
    8. Monitor your network for intruders.
    9. Cover the bases:- Make sure you have some kind of good firewall running.
    10. Don’t waste your time on ineffective security measures [7].

Enhancing the Security of Corporate WI-FI Networks Using DAIR:-DAIR stands for Dense Array of Inexpensive Radios.
DAIR systems are designed for building wireless network management applications that benefit from RF (radio frequency).
The DAIR approach is unique in that it builds on the following two important observations. First, in most enterprise
environments one finds plenty of desktop machines. The machines are generally stationary and are connected to wall power.
They have good wired connectivity, spare CPU cycles, free disk space, and high-speed USB ports. Second, inexpensive USB-
based wireless adapters are readily available and their prices continue to fall, by attaching USB-based wireless adapters to
desktop machines, and dedicating the adapters to the task of monitoring the wireless network, we create a low-cost monitoring
infrastructure that is then used to manage the security of the network [4].
There are many methos available for the wi-fi security, many encryption schemes such as EAP,TKIP, AES, WEP, WPA,
WPA2 etc and many security tips are develeped.
AES:- Advanced Encryption Standard is gaining acceptance as appropriate replacement for RC4 algorithm in WEP. AES uses
the Rijandale Algorithm and supports the following key lengths-128 bit, 192 bit, 256 bit. AES is considered to be un-crack
able by most Cryptographers. NIST has chosen AES for Federal Information Processing Standard (FIPS). In order to improve
wireless LAN security the 802.11i is considering inclusion of AES in WEPv2.
TKIP:- The temporal key integrity protocol (TKIP), initially referred to as WEP2, is an interim solution that fixes the key
reuse problem of WEP, that is, periodically using the same key to encrypt data. The TKIP process begins with a 128-bit
"temporal key" shared among clients and access points. TKIP combines the temporal key with the client's MAC address and


Issn 2250-3005(online)                                    September| 2012                                    Page 1409
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



then adds a relatively large 16-octet initialization vector to produce the key that will encrypt the data. This procedure ensures
that each station uses different key streams to encrypt the data [5].
WEP: - The industry’s solution: WEP (Wired Equivalent Privacy) [3], [5], [8], [9], [10]
                Share a single cryptographic key among all devices
                Encrypt all packets sent over the air, using the shared key
                Use a checksum to prevent injection of spoofed packets [6].
Some devices support the various versions of WEP-
 WEP-64-bit key (sometimes called WEP-40)
 WEP 128-bit key (sometimes called WEP-104)
 WEP 256-bit key.

WAP:- WAP stands for Wi-Fi Protected Access [3], [5], [8], [9], [10]. This standard was developed to replace WEP. Wi-Fi
devices typically support multiple variations of WPA technology. Traditional WPA, also known as WPA-Personal and
sometimes also called WPA-PSK (for pre-shared key), is designed for home networking while another version, WPA-
Enterprise, is designed for corporate networks.
WAP2 is an improved version of Wi-Fi Protected Access supported by all newer Wi-Fi equipment. Like WPA, WPA2 also
exists in Personal/PSK and Enterprise forms [8].
Evolution of wi-fi security:- Wi-Fi technology has evolved quickly to adapt to changing market and technological conditions.
Global adoption of WPA and WPA2 advanced security mechanisms has further strengthened trust and reliance on Wi-Fi
CERTIFIED equipment worldwide [3].

          Date                     Milestone
September 1997              IEEE 802.11 standard ratified, including WEP

April 2000                  Wi-Fi CERTIFIED program launched, with support for WEP

May 2001                    IEEE 802.11i task group created
April 2003                  WPA introduced with:
                            •IEEE 802.1X
                            authentication
                            •Temporal Key Integrity Protocol (TKIP) encryption
                            •Support for EAP-Transport Layer Security (EAP-TLS)
September 2003              WPA mandatory for all Wi-Fi CERTIFIED equipment

June 2004                   IEEE 802.11i amendment ratified

September 2004              WPA2 introduced with:
                            • IEEE 802.1X authentication
                            • AES encryption
                            • Support for EAP-TLS
April 2005                  Support for four additional EAP-Tunnelled TLS Microsoft Challenge Handshake Authentication
                              Protocol Version 2 (EAP-TTLS/MSCHAPv2)
                            •Protected EAP Version 0 (PEAPv0)/EAP MSCHAPv2
                            •Protected EAP Version 1 (PEAPv1)/EAP Generic Token Card (EAP-GTC)
                            •EAP-Subscriber Identity Module (EAP-SIM)
March 2006                  WPA2 mandatory for all Wi-Fi CERTIFIED equipment

January 2007                Wi-Fi Protected Setup program launched
November 2007               IEEE 802.11w task group created

May 2009                    Support for EAP-AKA and EAP-FAST added

January 2012                Support for Protected Management Frames added to WPA2


                                         “ Table 1.showing wi-fi security timelines[3]


Issn 2250-3005(online)                                        September| 2012                                   Page 1410
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



 3. Proposed work:
Wired networks are more secure than wireless network. Wireless networks can be an effective way to extend network access.
Wired networks gain some privacy from their switches and routers and the buildings that enclose them. On a wireless network
everyone can 'hear' everyone else, even in public spaces outside the building, so there are problems of privacy of
communications, accountability for use and availability of service. WI-FI technology gaining the more and more popularity
now days, hence the security issues related to this technology is also needed in excess.
Protocol stack: - The protocol stack for WLANs was designed such that existing applications can use them with minor
modifications. The three layers are same to other networks:-application, transport and network layers are same. Proxy server
works on upper three layers but mostly on the application layer.

                                           Application Layer
                                           Transport Layer
                                           Network Layer
                                           MAC/Data-link Layer
                                           Physical Layer


Proxy server plays very important role in LAN network , in the same way if we add the proxy server to WLAN than in the
same way with the help of proxy server can protect the WLAN network also .
                                                                                  Client1

         Server
                                           Proxy
                                           server                                  Client2


   Proxy server in between the clients and server.
Proxy server is also known as “application level gateway”.proxy server provides increased performance and security. In the
proxy server the data enters through one port and is forwarded to another port or the rest of the network. Basically proxy
server plays the two important role:-
     1. Performance impovement:-Proxy servers saves the requests for a certain time period. Hence the performance
          increases dramatically for a group of users.for example if a person p request for a web page ,after some time another
          person q requests the same site than the proxy server returns the same web page for person q that it already fetched
          for the person p,instead of forwarding the request to the server. Hence the time will be saved .
     2. Filteration:-Proxy severs can also povides the facility of the filtering. Porxy server povides the content filtering
          application i.e. they control the content that may be relayed either in one direction or in the both directions.Proxy
          server can filter the requests.for example in school or in colleges certain web sites are blocked or we can not open
          some web sites this can also be done with the help of the proxy servers.
          Proxy server also provides the facility of caching. Proxy server can retrives the content saved form the previous
          request made either by the same person or by the different persons.proxy servers keeps the local copies of the
          frquently requested requests. Proxy server also provides the user authentication facility also.
          All users have there unique user name and password,these user name and password are saved in the proxy server ,if
          the user name or password do not match than that person can not access the network. This matching of user name
          and password is done by the proxy server in LAN in same way we can assign each user a unique user name and
          password so that any other person do not access the network so that the security will be increased.Proxy server plays
          important role in impoving LAN security and performance.
     We can use proxy sever only in a limited area like in college departments or within a compony having limited users where
     security is the main issue. We can not use them with a large users access because in large users access it in not possible to
     give such a large amount of user names and passwords. we can use with in a limited users access only.
     Hence if the proxy server is successfully added to the WI-FI network it improve the performance as well as the security
     in this network also.

Issn 2250-3005(online)                                      September| 2012                                     Page 1411
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



    4. Conclusion:
    WI-FI networks are growing day by day. The new challenges or we can say the security risks are also increases day to day.
    We can impove the performance as well as the security with the help of proxy server ,if it is implemented successfully.we can
    secure the WI-Fi network upto 5-10% with the help of the proxy server.

References:
1. www.wikipedia.com
2. www.webopedia.com
3. The State of Wi-Fi® Security Wi-Fi CERTIFIED™ WPA2TM Delivers Advanced Security to Homes, Enterprises and
    Mobile Devices by Wi-Fi Alliance.
4. Enhancing the Security of Corporate Wi-Fi Networks Using DAIR by Paramvir Bahly, Ranveer Chandray, Jitendra
    Padhyey, Lenin Ravindranathy Manpreet Singhz, Alec Wolmany, Brian Zillyy Microsoft Research, Cornell University.
5. Wireless lan security today and tomorrow by Sangram Goyal and Dr. S. A. Vetha Manickam Center for Information and
    Network Security Pune University.
6. Wireless security ppt by David Wagner.
7. Ten WI-FI security tips given by Chad Perrin.
8. Introduction to Wi-Fi Network Security By Bradley Mitchell .
9. Sara Nasre Wireless Lan Security Research Paper IT 6823 Information Security Instructor: Dr. Andy Ju An Wang Spring
    2004.
10. WI-FI security –WEP, WPA and WPA2 by Guillaume Lehembre.




.

.




Issn 2250-3005(online)                                       September| 2012                                    Page 1412

More Related Content

What's hot

5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Paul Stevens
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Wi-Fi Security with Wi-Fi P+
Wi-Fi Security with Wi-Fi P+Wi-Fi Security with Wi-Fi P+
Wi-Fi Security with Wi-Fi P+Ajin Abraham
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityAyoma Wijethunga
 

What's hot (20)

5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
609 618
609 618609 618
609 618
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...
 
05 wi fi network security
05 wi fi network security05 wi fi network security
05 wi fi network security
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
WPA 3
WPA 3WPA 3
WPA 3
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
WEP
WEPWEP
WEP
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
woot15-paper-novella
woot15-paper-novellawoot15-paper-novella
woot15-paper-novella
 
Wi-Fi Security with Wi-Fi P+
Wi-Fi Security with Wi-Fi P+Wi-Fi Security with Wi-Fi P+
Wi-Fi Security with Wi-Fi P+
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network Security
 

Viewers also liked

Manitobah product development phase gates
Manitobah product development phase gatesManitobah product development phase gates
Manitobah product development phase gatesTeddy Pai
 
Supply Chain Of SHOE MANUFACTURING FIRM
Supply Chain Of SHOE MANUFACTURING FIRMSupply Chain Of SHOE MANUFACTURING FIRM
Supply Chain Of SHOE MANUFACTURING FIRMniranjan nahak
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016Andrew Chen
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 

Viewers also liked (6)

Manitobah product development phase gates
Manitobah product development phase gatesManitobah product development phase gates
Manitobah product development phase gates
 
Supply Chain Of SHOE MANUFACTURING FIRM
Supply Chain Of SHOE MANUFACTURING FIRMSupply Chain Of SHOE MANUFACTURING FIRM
Supply Chain Of SHOE MANUFACTURING FIRM
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similar to Securing Wi-Fi Using a Proxy Server

Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.pptabenimelos
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAXEditor IJMTER
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
Device (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxDevice (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxYousef Al-Mutayeb
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 

Similar to Securing Wi-Fi Using a Proxy Server (20)

Pdf3
Pdf3Pdf3
Pdf3
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAX
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Device (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxDevice (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptx
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Securing Wi-Fi Using a Proxy Server

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 WI-FI Security by using Proxy server Promila1, Dr.R.S.Chhillar2 1, 2 Department of Computer Science and Application, M. D. U. Rohtak, India Abstract: With the whole world going mobile, data security remains the biggest challenge. Critical data (Business and Safety related) is lying on storage medium on a computer which is connected to hundreds of thousands of computers via internet. Wi-Fi uses a radio frequency to transmit data. Any user with a transceiver can connect to the network, if not properly secured. Use of the mobile networking is on rise and 60% of these are unsecured, risk of external threat is very high. A structured thread by an experienced hacker with malicious intent can get hold of user account and use it to access mission critical data. Thus it is of utmost importance to secure a Wi-Fi network. Stringent security policies must be followed. Multiple lever of security shall be put in place. Keywords: AES, DAIR, MAC, Proxy server, TKIP, WEP, WPA. 1. Introduction: WI-FI:- WI-FI stands for "Wireless Fidelity". Wi-Fi refers to wireless networking technology that allows computers and other devices to communicate over a wireless signal. Wi-Fi is a term for certain types of wireless local area network (WLAN) that use specifications in the 802.11 family. The term Wi-Fi was created by an organization called the Wi-Fi Alliance, which oversees tests that certify product interoperability. A product that passes the alliance tests is given the label "Wi-Fi certified" (a registered trademark). Originally, Wi-Fi certification was applicable only to products using the 802.11b standard. Today, Wi-Fi can apply to products that use any 802.11 standard. The 802.11 specifications are part of an evolving set of wireless network standards known as the 802.11 family. The particular specification under which a Wi-Fi network operates is called the "flavor" of the network. Wi-Fi has gained acceptance in many businesses, agencies, schools, and homes as an alternative to a wired LAN. Many airports, hotels, and fast-food facilities offer public access to Wi-Fi networks. “Figure1. Wi-fi logo” Proxy server:- A proxy server acts as an intermediary between websites and web browsers. Web browsers are configured to use a proxy server instead of accessing websites directly on the internet. A proxy server acts as a middleman between two networks. One network is typically the public Internet, the other is often a group of client computers sharing a single Internet connection. The primary remaining uses of a proxy server are to protect the privacy of systems behind the server, and to speed up Internet access through caching. However since the proxy can be configured not just to direct data ,but to change it en route,there are many potential uses. A proxy server caches frequently accessed data. If a web browser requests cached data, the proxy server can retrieve it quickly instead of making another request across the Internet, which is slower. A network can be configured so that the only way to reach the Internet is through a proxy server that allows only authorized users who have an account. Types of proxy server:- 1. Forward proxy: -A forward proxy takes request from an internal network and forwarding them to the Internet. “Figure2. Forward proxy “ Issn 2250-3005(online) September| 2012 Page 1408
  • 2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 1. Open proxy: - An open proxy forwards request from and to anywhere on the Internet. “Figure3. Open proxy “ 2. Reverse proxy:-A reverse proxy taking request from the Internet and forwards them to servers in an internal network. Those making requests connect to the proxy and may not be aware of the internal network. “Figure4. Reverse proxy “ 2. Related Work 10 tips of WI-FI security:-These tips are given by Chad Perrin in 2007 1. Use a strong password. 2. Don’t broadcast your SSID:- Serious security crackers who know what they are doing will not be deterred by a hidden SSID — the “name” you give your wireless network 3. Use good wireless encryption. 4. Use another layer of encryption when possible. 5. Restrict access by MAC access. 6. Shut down the network when it is not being used. 7. Shut down your wireless network interface, too. 8. Monitor your network for intruders. 9. Cover the bases:- Make sure you have some kind of good firewall running. 10. Don’t waste your time on ineffective security measures [7]. Enhancing the Security of Corporate WI-FI Networks Using DAIR:-DAIR stands for Dense Array of Inexpensive Radios. DAIR systems are designed for building wireless network management applications that benefit from RF (radio frequency). The DAIR approach is unique in that it builds on the following two important observations. First, in most enterprise environments one finds plenty of desktop machines. The machines are generally stationary and are connected to wall power. They have good wired connectivity, spare CPU cycles, free disk space, and high-speed USB ports. Second, inexpensive USB- based wireless adapters are readily available and their prices continue to fall, by attaching USB-based wireless adapters to desktop machines, and dedicating the adapters to the task of monitoring the wireless network, we create a low-cost monitoring infrastructure that is then used to manage the security of the network [4]. There are many methos available for the wi-fi security, many encryption schemes such as EAP,TKIP, AES, WEP, WPA, WPA2 etc and many security tips are develeped. AES:- Advanced Encryption Standard is gaining acceptance as appropriate replacement for RC4 algorithm in WEP. AES uses the Rijandale Algorithm and supports the following key lengths-128 bit, 192 bit, 256 bit. AES is considered to be un-crack able by most Cryptographers. NIST has chosen AES for Federal Information Processing Standard (FIPS). In order to improve wireless LAN security the 802.11i is considering inclusion of AES in WEPv2. TKIP:- The temporal key integrity protocol (TKIP), initially referred to as WEP2, is an interim solution that fixes the key reuse problem of WEP, that is, periodically using the same key to encrypt data. The TKIP process begins with a 128-bit "temporal key" shared among clients and access points. TKIP combines the temporal key with the client's MAC address and Issn 2250-3005(online) September| 2012 Page 1409
  • 3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 then adds a relatively large 16-octet initialization vector to produce the key that will encrypt the data. This procedure ensures that each station uses different key streams to encrypt the data [5]. WEP: - The industry’s solution: WEP (Wired Equivalent Privacy) [3], [5], [8], [9], [10]  Share a single cryptographic key among all devices  Encrypt all packets sent over the air, using the shared key  Use a checksum to prevent injection of spoofed packets [6]. Some devices support the various versions of WEP-  WEP-64-bit key (sometimes called WEP-40)  WEP 128-bit key (sometimes called WEP-104)  WEP 256-bit key. WAP:- WAP stands for Wi-Fi Protected Access [3], [5], [8], [9], [10]. This standard was developed to replace WEP. Wi-Fi devices typically support multiple variations of WPA technology. Traditional WPA, also known as WPA-Personal and sometimes also called WPA-PSK (for pre-shared key), is designed for home networking while another version, WPA- Enterprise, is designed for corporate networks. WAP2 is an improved version of Wi-Fi Protected Access supported by all newer Wi-Fi equipment. Like WPA, WPA2 also exists in Personal/PSK and Enterprise forms [8]. Evolution of wi-fi security:- Wi-Fi technology has evolved quickly to adapt to changing market and technological conditions. Global adoption of WPA and WPA2 advanced security mechanisms has further strengthened trust and reliance on Wi-Fi CERTIFIED equipment worldwide [3]. Date Milestone September 1997 IEEE 802.11 standard ratified, including WEP April 2000 Wi-Fi CERTIFIED program launched, with support for WEP May 2001 IEEE 802.11i task group created April 2003 WPA introduced with: •IEEE 802.1X authentication •Temporal Key Integrity Protocol (TKIP) encryption •Support for EAP-Transport Layer Security (EAP-TLS) September 2003 WPA mandatory for all Wi-Fi CERTIFIED equipment June 2004 IEEE 802.11i amendment ratified September 2004 WPA2 introduced with: • IEEE 802.1X authentication • AES encryption • Support for EAP-TLS April 2005 Support for four additional EAP-Tunnelled TLS Microsoft Challenge Handshake Authentication Protocol Version 2 (EAP-TTLS/MSCHAPv2) •Protected EAP Version 0 (PEAPv0)/EAP MSCHAPv2 •Protected EAP Version 1 (PEAPv1)/EAP Generic Token Card (EAP-GTC) •EAP-Subscriber Identity Module (EAP-SIM) March 2006 WPA2 mandatory for all Wi-Fi CERTIFIED equipment January 2007 Wi-Fi Protected Setup program launched November 2007 IEEE 802.11w task group created May 2009 Support for EAP-AKA and EAP-FAST added January 2012 Support for Protected Management Frames added to WPA2 “ Table 1.showing wi-fi security timelines[3] Issn 2250-3005(online) September| 2012 Page 1410
  • 4. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 3. Proposed work: Wired networks are more secure than wireless network. Wireless networks can be an effective way to extend network access. Wired networks gain some privacy from their switches and routers and the buildings that enclose them. On a wireless network everyone can 'hear' everyone else, even in public spaces outside the building, so there are problems of privacy of communications, accountability for use and availability of service. WI-FI technology gaining the more and more popularity now days, hence the security issues related to this technology is also needed in excess. Protocol stack: - The protocol stack for WLANs was designed such that existing applications can use them with minor modifications. The three layers are same to other networks:-application, transport and network layers are same. Proxy server works on upper three layers but mostly on the application layer. Application Layer Transport Layer Network Layer MAC/Data-link Layer Physical Layer Proxy server plays very important role in LAN network , in the same way if we add the proxy server to WLAN than in the same way with the help of proxy server can protect the WLAN network also . Client1 Server Proxy server Client2 Proxy server in between the clients and server. Proxy server is also known as “application level gateway”.proxy server provides increased performance and security. In the proxy server the data enters through one port and is forwarded to another port or the rest of the network. Basically proxy server plays the two important role:- 1. Performance impovement:-Proxy servers saves the requests for a certain time period. Hence the performance increases dramatically for a group of users.for example if a person p request for a web page ,after some time another person q requests the same site than the proxy server returns the same web page for person q that it already fetched for the person p,instead of forwarding the request to the server. Hence the time will be saved . 2. Filteration:-Proxy severs can also povides the facility of the filtering. Porxy server povides the content filtering application i.e. they control the content that may be relayed either in one direction or in the both directions.Proxy server can filter the requests.for example in school or in colleges certain web sites are blocked or we can not open some web sites this can also be done with the help of the proxy servers. Proxy server also provides the facility of caching. Proxy server can retrives the content saved form the previous request made either by the same person or by the different persons.proxy servers keeps the local copies of the frquently requested requests. Proxy server also provides the user authentication facility also. All users have there unique user name and password,these user name and password are saved in the proxy server ,if the user name or password do not match than that person can not access the network. This matching of user name and password is done by the proxy server in LAN in same way we can assign each user a unique user name and password so that any other person do not access the network so that the security will be increased.Proxy server plays important role in impoving LAN security and performance. We can use proxy sever only in a limited area like in college departments or within a compony having limited users where security is the main issue. We can not use them with a large users access because in large users access it in not possible to give such a large amount of user names and passwords. we can use with in a limited users access only. Hence if the proxy server is successfully added to the WI-FI network it improve the performance as well as the security in this network also. Issn 2250-3005(online) September| 2012 Page 1411
  • 5. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 4. Conclusion: WI-FI networks are growing day by day. The new challenges or we can say the security risks are also increases day to day. We can impove the performance as well as the security with the help of proxy server ,if it is implemented successfully.we can secure the WI-Fi network upto 5-10% with the help of the proxy server. References: 1. www.wikipedia.com 2. www.webopedia.com 3. The State of Wi-Fi® Security Wi-Fi CERTIFIED™ WPA2TM Delivers Advanced Security to Homes, Enterprises and Mobile Devices by Wi-Fi Alliance. 4. Enhancing the Security of Corporate Wi-Fi Networks Using DAIR by Paramvir Bahly, Ranveer Chandray, Jitendra Padhyey, Lenin Ravindranathy Manpreet Singhz, Alec Wolmany, Brian Zillyy Microsoft Research, Cornell University. 5. Wireless lan security today and tomorrow by Sangram Goyal and Dr. S. A. Vetha Manickam Center for Information and Network Security Pune University. 6. Wireless security ppt by David Wagner. 7. Ten WI-FI security tips given by Chad Perrin. 8. Introduction to Wi-Fi Network Security By Bradley Mitchell . 9. Sara Nasre Wireless Lan Security Research Paper IT 6823 Information Security Instructor: Dr. Andy Ju An Wang Spring 2004. 10. WI-FI security –WEP, WPA and WPA2 by Guillaume Lehembre. . . Issn 2250-3005(online) September| 2012 Page 1412