EC4131 - Kunal Dipak Kharat

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Survey

on

“Security of Wireless Communications”

Submitted by
Kunal Dipak Kharat (EC4131)

B.Tech (A)
(Electronics & Telecommunication)

Dr. Babasaheb Ambedkar Technological University,


Lonere(M.S.)

Department of Electronics and Telecommunication


Deogiri Institute of Engineering and Management Studies,
Chhatrapati Sambhajinagar
(2023-2024)
INDEX

Content Page No.

1. INTRODUCTION 1
2. SPECIFICATIONS 2
2.1 Wireless Networks 2
2.2 Wireless LAN. 3
2.3 AD HOC Networks 3

3. LAYERED SECURITY 4
3.1 Level -1 Wireless deployment and policy 4
3.2 Level -2 Wireless access control 4
3.3 Level -3 Perimeter security 5
3.4 Level -4 Application security 5

4. SECURITY OF WIRELESS LANS 7


4.1 Authentication 7
4.2 Confidentiality 7
4.3 Integrity 7

5. CONCLUSION 9
6. REFERENCES 10
1. INTRODUCTION

Wireless communications are, by any measure, the fastest growing segment of the
communications industry. As such, it has captured the attention of the media and the
imagination of the public. Cellular systems have experienced exponential growth over the
last decade and there are currently around two billion users worldwide [1 – 3]. The latest
statistics from the International Telecommunications Union (ITU) in 2013 reveals that [4]
there are more than 6 billion mobile subscribers worldwide, and more than 40% of the
world’s population have access to the internet. The authors in [5] and [6] define wireless
communications as the transmission of message signal via low-energy radio frequency
waves using open air, a transmitter and a receiver as the media. The message signal is
transmitted to the closest antenna site and is delivered via optic-fibre cable to a wired
telephone or by radio signal to another wireless phone. The open nature of wireless networks
makes wireless transmissions much prone to various malicious attacks by intruders. This
ranges from denial-of-Service attacks, eavesdropping for data interception, identity theft,
violation of privacy rights, to insertion of viruses or Malicious codes to disrupt legitimate
transmissions, and Jamming attacks. Furthermore, intruders can disable firewall-Protection
to gain access to sensitive information transmitted between two wireless devices, if such
information is not well Protected by strong encryption. Hence, the need to improve Wireless
communication security to fight against cyber-Criminal activities, since a greater number of
people are using wireless networks such as cellular networks and Wi-Fi for online banking
and personal emails, owing to the widespread use of smartphones [6] .

Wireless technologies, in the simplest sense, enable one or more devices to


communicate without physical connections without requiring network or peripheral cabling.
Wireless Technologies use radio frequency transmissions as the means for transmitting data,
whereas wired technologies use cables. Wireless technologies range from complex systems,
such as Wireless Local Area Networks (WLAN) and cell phones to simple devices such as
wireless headphones, microphones, and other devices that do not process or store
information. They also include infrared (IR) devices such as remote controls, some cordless
computer keyboards and mice, and wireless hi-fi stereo headsets, all of which require a
direct line of sight between the transmitter and the receiver to close the link.

1
2. SPECIFICATIONS

2.1 Wireless Networks


Wireless networks serve as the transport mechanism between devices and among devices
and the traditional wired networks (enterprise networks and the Internet). Wireless networks
are many and diverse but are frequently categorized into three groups based on their
coverage range: Wireless Wide Area Networks (WWAN), WLANs, and Wireless personal
Area Networks (WPAN). WWAN includes wide coverage area technologies such as 2G
cellular, Cellular Digital Packet Data (CDPD) and Global System for Mobile
communications (GSM), and Mobitex. WLAN, representing wireless local area networks,
includes 802.11, HiperLAN, and several others. WPAN represents wireless personal area
network technologies such as Bluetooth and IR. All of these technologies are “tether less”—
they receive and transmit information using electromagnetic (EM) waves. Wireless
technologies use wavelengths ranging from the radio frequency (RF) band up to and above
the IR band. The frequencies in the RF band cover a significant portion of the EM radiation
spectrum, extending from 9 kilohertz (kHz), the lowest allocated wireless communications
frequency, to thousands of gigahertz (GHz). As the frequency is increased beyond the RF
spectrum, EM energy moves into the IR and then the visible spectrum. Wireless networks
allow devices to be moved about with varying degrees of freedom and still maintain
communication with each other. They also offer greater flexibility than cabled networks and
significantly reduce the time and resources needed to set up new networks and allow for ad
hoc networks to be easily created, modified or torn down. There are many forms of wireless
networks. One way of Categorizing wireless networks is to consider the relative range and
complexity of each Type of network. For example:
1) WIRELESS PERSONAL AREA NETWORK (WPAN) – a small-scale
wireless network that requires little or no infrastructure and operates within a
short range. A WPAN is typically used by a few devices in a single room instead
of connecting the devices with cables. Examples include print services or
enabling a wireless keyboard or mouse to communicate with a computer.

2) WIRELESS LOCAL AREA NETWORKS (WLANS) are groups of wireless


networking nodes within a limited geographic area, such as an office building or
campus, that are capable of radio communications. WLANs are usually

2
implemented as extensions to existing wired local area networks to provide
enhanced user mobility.

3) WIRELESS METROPOLITAN AREA NETWORKS (WMANS) can


provide connectivity to users located in multiple facilities generally within a few
miles of each other. Many WMAN implementations provide wireless broadband
access to customers in metropolitan areas.

4) WIRELESS WIDE AREA NETWORKS (WWANS) connect individuals and


devices over large geographic areas. WWANs are typically used for mobile
voice and data communications, as well as satellite communications.

2.2 Wireless LAN


WLANs allow greater flexibility and portability than do traditional wired local area
networks (LAN).Unlike a traditional LAN, which requires a wire to connect a user’s
computer to the network, a WLAN connects computers and other components to the
network using an access point device. An access point communicates with devices equipped
with wireless network adaptors; it connects to a wired Ethernet LAN via an RJ-45 port.
Access point devices typically have coverage areas of up to 300 feet(approximately 100
meters). This coverage area is called a cell or range. Users move freely within the cell with
their laptop or other network device. Access point cells can be linked together to allow users
to even “roam” within a building or between buildings.

2.3 AD HOC Networks


Ad hoc networks such as Bluetooth are networks designed to dynamically connect remote
devices such as cell phones, laptops, and PDAs. These networks are termed “ad hoc”
because of their shifting network topologies. Whereas WLANs use a fixed network
infrastructure, ad hoc networks maintain random network configurations, relying on a
master-slave system connected by wireless links to enable devices to communicate. In a
bluetooth network, the master of the piconet controls the changing network topologies of
these networks. It also controls the flow of data between devices that are capable of
supporting direct links to each other. As devices move about in an unpredictable fashion,
these networks must be reconfigured on the fly to handle the dynamic topology.

3
3. LAYERED SECURITY
A layered approach to wireless security can provide a high degree of protection and leverage
existing network security investments. The layered approach consists of the following four
levels:
Wireless deployment and policy
Wireless access control
Perimeter security
Application security
When implemented, as discussed below, the layered approach can make a WLAN more
secure than a typical wired network by centralizing points of access, implementing
manageable device-level security and governing internal access with firewall-level policies.
Security professionals speak in terms of work factor, which is an important concept when
implementing layered security. A network with a high work factor is difficult to break into,
while a network with a low work factor can be compromised more easily. If hackers
determine that the network has a high work factor, which is inherent in the layered approach,
they will soon move on to those that are less secure.

3.1 Level -1 Wireless deployment and policy


The physical deployment of wireless networking devices is the foundation on which a secure
environment is created. The basic rule of thumb maintains that one does not over design the
wireless network. The goal is to avoid broadcasting where it is not necessary. When
designing the network, consider who is accessing the WLAN, where they are located and
what the minimum coverage requirements are. Using common sense is also helpful. For
example, four WAPs should not be installed in a space where one would suffice or in areas
that do not need access to the network, such as the building entrance waiting room. More is
not necessarily better. Wireless NICs can be set to one of two operational modes—
infrastructure mode, which allows the NIC to communicate only with a WAP, and ad hoc
mode, which allows the NIC to communicate with any wireless device, such as other NICs.
A policy should exist requiring NICs to operate in infrastructure mode only. Devices in ad
hoc mode can be readily exploited by hackers.

3.2 Level -2 Wireless access control


Best practices for wireless access control include:

4
Configure the WEP for the highest level of encryption.
Change the SSID regularly, where practical.
Do not broadcast the SSID.
Verify the media access control (MAC) address upon device connection.
Maintain and enforce access policies for unauthorized/unrecognized devices.
In practice, access control has two components: device access control and user
authentication (personnel access control). Level two is concerned with device access, While
user authentication is addressed in level three, perimeter security. It is crucial that the
security measures, such as WEP and SSID that are built into wireless network devices are
properly configured and managed. The WAP must be configured not to Broadcast the SSID,
and the SSID should be changed regularly, if practical. Also, the WEP should be set to the
highest level of encryption (typically 128- or 256-bit encryption), and the pass phrase should
be changed regularly, which may or may not be practical depending on the size of the
network.

3.3 Level -3 Perimeter security


Best practices for perimeter security include:
Install an intrusion prevention system (IPS) and wireless firewall on WLAN.
Encrypt WLAN traffic using a virtual private network (VPN).
Direct all traffic through the VPN server and configure clients appropriately.
Maintain and enforce VPN routing and access policies.
Maintain and enforce access policies for user authentication (i.e, username/password).
VPN technology provides a method for securing traffic that moves across entrusted network
segments, such as the Internet or the WLAN. A VPN is essentially an extension of a private
network that encompasses encapsulated, encrypted and authenticated connections. VPN
encryption algorithms are Complex and extremely difficult to compromise. VPN
connections should be required for all WLAN traffic. Implementing VPN for a wireless
network entails deploying a VPN server on the network and configuring all WLAN clients
to communicate through a VPN tunnel terminated on this server.

3.4 Level -4 Application security


Best practices for application security include:
• Implement an application-level user authentication system.

5
• Maintain and enforce permissions and password policies.
• Install vendor patches as they become available.
Activating basic security measures at the application level on the network is a recommended
best practice, irrespective of the wired/wireless nature of connectivity. Protecting network
applications, such as Windows NT, People soft and other enterprise systems, with rigorous
password policies and Permissions provide one final hurdle that hackers must overcome to
gain access to the proprietary information. It is imperative to install application patches as
they are released. Patches frequently address known security vulnerabilities. Most network
breaches exploit such vulnerabilities and are the primary reason signature-based IPSs are an
indispensable component of a comprehensive network security program.

6
4. SECURITY OF WIRELESS LANS

This section discusses the built-in security features of 802.11. It provides an overview of
the inherent security features to better illustrate its limitations and provide a motivation for
some of the recommendations for enhanced security. The IEEE 802.11 Specification
identified several services to provide a secure operating environment. The security services
are provided largely by the Wired Equivalent Privacy (WEP) protocol to protect link-level
data during wireless transmission between clients and access points. WEP does not provide
end-to-end security, but only for the wireless portion of the connection as shown in Figure.

Figure1: Wireless Security of 802.11 in typical Network

The three basic security services defined by IEEE for the WLAN environment are as
follows:
4.1 Authentication- A primary goal of WEP was to provide a security service to verify
the identity of communicating client stations. This provides access control to the network
by denying access to client stations that cannot authenticate properly.

4.2 Confidentiality- Confidentiality, or privacy, was a second goal of WEP. It was


developed to provide “privacy achieved by a wired network.” The intent was to prevent
information compromise from casual eavesdropping (passive attack).

4.3 Integrity Another goal of WEP was a security service developed to ensure that
messages are not modified in transit between the wireless clients and the access point in an

7
active attack. It is important to note that the standard did not address other security services
such as audit, authorization, and non repudiation.

Figure2: Shared-Key Authentication Message Flow

8
5. CONCLUSION

Wireless networking provides numerous opportunities to increase productivity and cut


costs. It also alters an organization’s overall computer security risk profile. Although it is
impossible to totally eliminate all risks associated with wireless networking, it is possible to
achieve a reasonable level of overall security by adopting a systematic approach to assessing
and managing risk. This paper discussed the threats and vulnerabilities associated with each
of the three basic technology components of wireless networks (clients, access points, and
the transmission medium) and described various commonly available countermeasures that
could be used to mitigate those risks. A combined effort of users, employers and system
administrators is required in order to fight against such malicious activities. Appropriate
countermeasures in every form can help the organization minimize the risk of illegal
penetration. Up to date tools, constant monitoring, proper management and appropriate
countermeasures are the ultimate weapons to fight against wireless security attacks. In this
paper, the authors have x-rayed a comprehensive overview of wireless communications
networks, the associated security vulnerabilities and control mechanisms aimed at
protecting the integrity, confidentiality, availability and authenticity of users of wireless
networks against attackers. We also discussed a variety of wireless attacks encountered at
different interconnected protocol layers and a number of factors contributing to call-drops
and network congestion. We further presented a range of security-control mechanisms as
prescribed by IEEE 802.11B. Finally, we presented an analysis of jamming attacks and their
anti-jamming techniques.

In all, we make bold to say that the security of wireless networks is all encompassing!
While it may be difficult to totally eradicate all vulnerabilities associated with wireless
networking, it is rather easier to achieve an overall level of security, if a systematic method
is adopted in the assessment and management of risks. It therefore behoves on WLAN users
to constantly guard against potential risks by exploiting the suggested actions detailed in
this paper. However, a notable best practice of securing wireless network is to have adequate
knowledge of security, accurate implementation and sustained maintenance.

9
6. REFERENCES

[1] J. Abbas, Future Trends in Mobile Communications Resource and Security


Management, University of Sidney Publishing, Sidney, 2005.
[2] A. A. Adegbemile, “Development of Telecommunications in Nigeria and its Impact on
National Development: Experiences from around the World”, Journal of Information
Technology, Vol. 6, No. 8, pp. 884-890, 2007.
[3] T. Adeyinka, J. Ajiboye, A. Emmanuel, and J. Wojuade, “Stakeholders’ Perception of
the Impact of a Global System for Mobile Communication on Nigeria’s Rural Economy:
Implications for an Emerging Communication Industry”, Journal of Community
Informatics, Vol. 3, No. 4, pp. 1-19, 2007.
[4] Mitchell Ashley , “A Guide to Wireless Network Security” Information systems Control
Journal ,Volume 3,2004.
[5] Karen Scarfone, Derric Dicoi, “ Wireless Network Security for IEEE
802.11a/b/g,Bluetooth(DRAFT)”,NISTPublication-800-48.Augest 2007.
[6] Tom karygiannis, Les Owens, “Wireless Network Security for IEEE
802.11a/b/g,Bluetooth(DRAFT)”,NISTPublication-800-48.November 2002
[7] Poonam KK, Laghari A, Laghari R (2019) A Step towards the Efficiency of Collisions
in the Wireless Sensor Networks. EAI Endorsed Transactions on Scalable Information
Systems, 6, no. 23

10

You might also like