A Survey On Security Issues In WIFI-Technology.
Name :- Siva Surya Gunturi.
Student ID :- 20295323.
Course Name :- Network Security Systems ( ELEE- 6399-03 ).
Semester :- Fall.
Year :- 2014.
INTRODUCTION
In this paper we can know about the exploits of Wi-Fi Security. And also the commercial and wireless approach to the wireless networks. The Keywords about which we discuss are War Driving, wireless security and the security protocols of 802.11. In the rapid development world Wi-Fi technology is the important invention to make people think on it and invent similar models. And they invented similar models to use the Wi-Fi technology more such as Bluetooth, GPRS, WiMAX, 3G technology later on 4G and LTE.
Later
…show more content…
The other standards which are used in mobile phones are 1st generation, 2nd generation, 3rd generation, 4th generation, and LTE. The latest upcoming technology is the 5th generation. We can use the Wi-Fi in many devices like personal laptops, smartphones, computers etc. To obtain a wireless network computer or any equipment should have wireless network interface controller. These signals are transferred through a single radio frequency channel. By using multiple overlapping access points the wireless signals can the transferred to many kilometers. While coming to the security the Wi-Fi has a much less security than wired networks. From the latest technology we have many protocols to get a secured network. Wi-Fi can be used in various modes such as home group, public areas and also in business group. To access the Wi-Fi in various forms we use routers such as digital subscriber router, cable modem with the help of Wi-Fi access point. This technology became such an important invention for all over the world.
Various Wi-Fi access points in the world and there types:-
Firstly, they started city by city Wi-Fi access point to make a use of this technology. In the India Mysore became the first city as a Wi-Fi enabled city in 2004, whereas in United States Sunnyvale California is the first city which became a Wi-Fi enabled city in 2005.
Secondly, they started campus by campus Wi-Fi access point in the United States. Traditionally some colleges in the
Privacy: In a wireless network all the devices are able to hear data traffic within their ranges which can be a threat to the security of the link. IEEE 802.11 counters this problem by offering a privacy service option that raises the security level of the 802.11 network to that of a wired network.
Wireless network infrastructure has become just another connection method for corporate and home users alike. This rapid acceptance can be attributed from:
Wireless Routers is a wireless local area network (WLAN) that determine the next route of the packet should travel to the destination (Rouse, 2005). It converts the internet connection that was received from phone lines into radio signals and brings convenience to the portability devices that has built-in network card to gain the radio signals to get to the Internet connection (Switcher, 2015). Table 2 refers to the comparison of three models of wireless router.
To improve security, the Wi-Fi uses various built-in WEP encryption technologies to prevent attacks from
Outline a wireless network and technology that you use regularly. The WLANs which are derived from the IEEE 802.11 standards, and marketed under the Wi-Fi trademark name. The WLANs security is neither forthright/candid nor simple, and it is continuously varying. Even though, as WLAN increase client output, they also expose the networks to a new group of potential hackers. With the present inherent security weakness of the 802.11 standard, all companies, small, medium or large, need to find out their security conditions derived from the applications using the WLAN. The standards also provide requirements for high-speed networks that support most modern-day applications. What sorts of security issues do
Users that have a wireless LAN should add security to ensure only intended users have access. Some safeguards include use of WEP (Wired Equivalent Privacy) encryption, IPsec, WPA (WiFi Protected Access), with a firewall or DMZ. A DMZ (demilitarized zone) is a physical or logical sub-network that separates the LAN from other entrusted networks
Wi-Fi Protected Access 2, the follow on security method to WPA for wireless networks that provides stronger data protection and network access control. It provides enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Based on the IEEE 802.11i standard, WPA2 provides government grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm and 802.1x-based authentication.
The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security
Wireless connectivity is critical to most homes and corporations as the world advances in technology. The technology has grown to a capacity that allows for extreme growth in wireless infrastructure as well as a trend of bringing your own technology device. Many corporations experience a high volume of critically important information being transferred over it wireless network so security is essential. There are many differences between a home and corporate wireless installation and each has its differences in securing.
In 1991 wifi was invented, and as the years go on wifi has been developing and changing in the most incredible ways. Wifi has also changed on how we communicate with people, and how we shop for items. As changes come, trouble also comes with it. In recent years, parents have been blaming wifi for the recent problems their children have been facing. The research and studies that have been conducted shows that an increase in wifi access and coverage does not pose a danger to students in
Wifi allows us to search things up by using a browser (Google, Bing, Yahoo, etc.). A lot of people today find things out by simply typing in a word or phrase and can get information about the subject or object easily. All we have to do is type in a
According to Danzig, it took Mr. Kostolnik’s neighbor, who had no hacking experience was able to get to his Wi-Fi after buying the cracking Wi-Fi software. There are three encryption technologies: WEP, WPA and WPA2 where WPA and WPA2 can be are current encryption protocol with TKIP (a 128-bit key is generated per packet) and AES (a different 128-bit encryption), which are very difficult to crack. Changing the default SSID is another step to secure a Wi-Fi. The above picture shows some of the current wireless brand names like Motorola, Linksys or Netgear.
Although there are many threat of WLAN, you still can reduce those threats by applying some technology in your network. For example, you can use a Core Security Standard. It provides protection, which are confidentiality, authentication and message integrity, between the wireless access point and the wireless host. Furthermore, you also can use Wired equivalent privacy (WEP) security. In WEP, everyone shares the same access point, which requires the same key, and WEP’s key is not automated mechanism for changing. On the other hand, Wireless Protected Access (WPA) is also an option for you. WPA is developed by using the concept of Core security standard, so it could be used on older wireless access points and it is stronger than WEP. Finally, 802.11i is another solution for your concerns about the network security. 802.11i is considered as WAP2, and it uses extremely strong AES-CCMP encryption, which has 129-bits keys and a key management method for automatically changing keys. That’s all about the
Examples of wireless networks include cell phone networks, Wi-Fi local networks and terrestrial microwave networks.
The last decade of this millennium saw an increment in the usage of wireless devices such as Bluetooth enabled devices that use wireless networks and smartphones with a wireless enabled feature that can allow users to access the internet from anywhere. All that is required is a place where the WLAN is accessible and then get connected using a username and password provided by ISP. WLANs have gained popularity globally as they are being used in places such as universities, airports, places of residence, cafes and so forth. They have numerous benefits such as mobility and flexibility compared to the traditional wired. As the popularity of its usage continues to heighten, it has become important to look at an aspect of security available for WLANS to prevent the network risks associated with this type of network. WEP is a security mechanism for WLANS that this paper will focus on much. The paper will discuss WEP and the weaknesses it has that make it prone to attack.