EC4131 - Kunal Dipak Kharat
EC4131 - Kunal Dipak Kharat
EC4131 - Kunal Dipak Kharat
on
Submitted by
Kunal Dipak Kharat (EC4131)
B.Tech (A)
(Electronics & Telecommunication)
1. INTRODUCTION 1
2. SPECIFICATIONS 2
2.1 Wireless Networks 2
2.2 Wireless LAN. 3
2.3 AD HOC Networks 3
3. LAYERED SECURITY 4
3.1 Level -1 Wireless deployment and policy 4
3.2 Level -2 Wireless access control 4
3.3 Level -3 Perimeter security 5
3.4 Level -4 Application security 5
5. CONCLUSION 9
6. REFERENCES 10
1. INTRODUCTION
Wireless communications are, by any measure, the fastest growing segment of the
communications industry. As such, it has captured the attention of the media and the
imagination of the public. Cellular systems have experienced exponential growth over the
last decade and there are currently around two billion users worldwide [1 – 3]. The latest
statistics from the International Telecommunications Union (ITU) in 2013 reveals that [4]
there are more than 6 billion mobile subscribers worldwide, and more than 40% of the
world’s population have access to the internet. The authors in [5] and [6] define wireless
communications as the transmission of message signal via low-energy radio frequency
waves using open air, a transmitter and a receiver as the media. The message signal is
transmitted to the closest antenna site and is delivered via optic-fibre cable to a wired
telephone or by radio signal to another wireless phone. The open nature of wireless networks
makes wireless transmissions much prone to various malicious attacks by intruders. This
ranges from denial-of-Service attacks, eavesdropping for data interception, identity theft,
violation of privacy rights, to insertion of viruses or Malicious codes to disrupt legitimate
transmissions, and Jamming attacks. Furthermore, intruders can disable firewall-Protection
to gain access to sensitive information transmitted between two wireless devices, if such
information is not well Protected by strong encryption. Hence, the need to improve Wireless
communication security to fight against cyber-Criminal activities, since a greater number of
people are using wireless networks such as cellular networks and Wi-Fi for online banking
and personal emails, owing to the widespread use of smartphones [6] .
1
2. SPECIFICATIONS
2
implemented as extensions to existing wired local area networks to provide
enhanced user mobility.
3
3. LAYERED SECURITY
A layered approach to wireless security can provide a high degree of protection and leverage
existing network security investments. The layered approach consists of the following four
levels:
Wireless deployment and policy
Wireless access control
Perimeter security
Application security
When implemented, as discussed below, the layered approach can make a WLAN more
secure than a typical wired network by centralizing points of access, implementing
manageable device-level security and governing internal access with firewall-level policies.
Security professionals speak in terms of work factor, which is an important concept when
implementing layered security. A network with a high work factor is difficult to break into,
while a network with a low work factor can be compromised more easily. If hackers
determine that the network has a high work factor, which is inherent in the layered approach,
they will soon move on to those that are less secure.
4
Configure the WEP for the highest level of encryption.
Change the SSID regularly, where practical.
Do not broadcast the SSID.
Verify the media access control (MAC) address upon device connection.
Maintain and enforce access policies for unauthorized/unrecognized devices.
In practice, access control has two components: device access control and user
authentication (personnel access control). Level two is concerned with device access, While
user authentication is addressed in level three, perimeter security. It is crucial that the
security measures, such as WEP and SSID that are built into wireless network devices are
properly configured and managed. The WAP must be configured not to Broadcast the SSID,
and the SSID should be changed regularly, if practical. Also, the WEP should be set to the
highest level of encryption (typically 128- or 256-bit encryption), and the pass phrase should
be changed regularly, which may or may not be practical depending on the size of the
network.
5
• Maintain and enforce permissions and password policies.
• Install vendor patches as they become available.
Activating basic security measures at the application level on the network is a recommended
best practice, irrespective of the wired/wireless nature of connectivity. Protecting network
applications, such as Windows NT, People soft and other enterprise systems, with rigorous
password policies and Permissions provide one final hurdle that hackers must overcome to
gain access to the proprietary information. It is imperative to install application patches as
they are released. Patches frequently address known security vulnerabilities. Most network
breaches exploit such vulnerabilities and are the primary reason signature-based IPSs are an
indispensable component of a comprehensive network security program.
6
4. SECURITY OF WIRELESS LANS
This section discusses the built-in security features of 802.11. It provides an overview of
the inherent security features to better illustrate its limitations and provide a motivation for
some of the recommendations for enhanced security. The IEEE 802.11 Specification
identified several services to provide a secure operating environment. The security services
are provided largely by the Wired Equivalent Privacy (WEP) protocol to protect link-level
data during wireless transmission between clients and access points. WEP does not provide
end-to-end security, but only for the wireless portion of the connection as shown in Figure.
The three basic security services defined by IEEE for the WLAN environment are as
follows:
4.1 Authentication- A primary goal of WEP was to provide a security service to verify
the identity of communicating client stations. This provides access control to the network
by denying access to client stations that cannot authenticate properly.
4.3 Integrity Another goal of WEP was a security service developed to ensure that
messages are not modified in transit between the wireless clients and the access point in an
7
active attack. It is important to note that the standard did not address other security services
such as audit, authorization, and non repudiation.
8
5. CONCLUSION
In all, we make bold to say that the security of wireless networks is all encompassing!
While it may be difficult to totally eradicate all vulnerabilities associated with wireless
networking, it is rather easier to achieve an overall level of security, if a systematic method
is adopted in the assessment and management of risks. It therefore behoves on WLAN users
to constantly guard against potential risks by exploiting the suggested actions detailed in
this paper. However, a notable best practice of securing wireless network is to have adequate
knowledge of security, accurate implementation and sustained maintenance.
9
6. REFERENCES
10