Malla Reddy Institute of Technology & Science: Wireless Network Security
Malla Reddy Institute of Technology & Science: Wireless Network Security
INDEX
Table of contents Page No.
1. Abstract i
2. List of figures ii
3. List of tables i
4. Introduction 1
5. Literature Survey 5
7. Advantages 23
8. Disadvantages 25
9. Conclusion 26
10. References 27
WIRELESS NETWORK SECURITY
1. ABSTRACT
This is the study over the wireless network security. As the wireless
communication has the different way of physical transport compared to wire
environment of communication thus we have to use different measure to secure a
network in wireless environment. Wireless networking has more security threats and
vulnerabilities and we must have an effective management of it compare with wired
technology which is more a management issue. Wireless networking has very
important features as it offer firm and user’s flexibility, and portability with in the
budget. It allow the users to get access to the network without the physical wired tied
between them. It uses high frequency radio waves to communicate between devices.
4. INTRODUCTION
Wireless networks are computer networks that are not connected by cables of any
kind. The use of a wireless network enables enterprises to avoid the costly process of
introducing cables into buildings or as a connection between different equipment
locations. The basis of wireless systems are radio waves, an implementation that takes
place at the physical level of network structure.
Wireless networks use radio waves to connect devices such as laptops to the Internet,
the business network and applications. When laptops are connected to Wi-Fi hot spots
in public places, the connection is established to that business’s wireless network.
wireless networks have an important role to play in the development of a country like
India. Wireless networks are very common, both for organizations and individuals.
Many laptop computers have wireless cards pre-installed. The ability to enter a
network while mobile phones and tablets also great benefits. However, wireless
networking has many security issues. Hackers have found wireless networks
WIRELESS NETWORK SECURITY
relatively easy to break into, and even use wireless technology to crack into wired
networks. So there should have proper Management of Operational and Technical
issues and recommendations for the secure deployment of wireless network security.
In this unit will introduce the benefits, components and security issues in wireless
networks.
Wireless networks are computer networks that are not connected by cables of any
kind. The use of a wireless network enables enterprises to avoid the expensive
process of introducing cables into buildings or as a connection between different
equipment locations. The basis of wireless systems is radio waves, an implementation
that takes place at the physical level of network structure. Wireless networks use
radio waves to connect devices such as laptops to the Internet, the business network
and applications. When laptops are connected to Wi-Fi hot spots in public places, the
connection is established to that business’s wireless network.
· Wireless Local Area Network (WLAN): Links two or more devices using a
wireless distribution method, providing a connection through access points to the
wider Internet. Sometimes known as LAWN (Local Area Wireless Network), this
type of network takes place when any handheld device, preferably smartphones, is
connected to the nearest networks with the help of a wireless connection. A WLAN
can be constructed through any kind of wireless network protocol, but the most
common way of ensuring a connection is through a Bluetooth or Wi-Fi.
WIRELESS NETWORK SECURITY
The WLAN support can range from two or more devices. However, once the number
of devices starts to increase, this wireless network becomes difficult to manage. Also,
you will need to rely on repeaters or signal boosters to cover a vast geographical
location
A wireless network that is intended to cover an area that ranges around 31 miles or 50
kilometers is a WMAN. This specific branch of the network allows multiple locations
or buildings to stay connected within any metropolitan area. It is used to connect
different campuses of a single university, various blocks of a hospital, and multiple
office buildings. The secure connection does not require a network of cables running
from one building to the next. Instead, it relies on strong radio waves or infrared light
to transmit data.
The need to have WPAN is increasing rapidly. As more and more individuals rely on
electronic devices within their workspace or homes, a distinct need to have stable
wireless connection among the devices has emerged.
WIRELESS NETWORK SECURITY
5 . Literature Survey
Wireless network or Wi-Fi, the moment you hear these words you realize how
convenient your life has become. Wireless Internet Connection has made it easy for
anyone to use the Internet at any device ranging from Laptops, Smartphones, and
Tablets, etc. from anywhere in the house without managing tons of cable bundles.
One important thing to consider here that wireless network does not end at your home
or office’s wall, it is possible that the signals of your wireless network are extended to
other neighboring homes or offices. Today we are going to discuss why you should
secure wireless network that you use at home, home office or office.
Nowadays the application of a Wi-fi connection is not limited just to browsing the
internet using any device, but you can attach a lot of other devices as per your
convenience, for instance, you can take printout while sitting in a different room or
floor of the house altogether.
I was browsing through some YouTube videos the other day and found out that many
people do not secure wireless network, some don’t even know about it and many just
ignore it.
Wireless network sure makes our life easy but while using wi-fi we also have to
ensure that the home network that we are using is also secure. Because if we do not
secure wireless network connection, then there are consequences as well. For
example, our neighbors can use our internet connection and consume our bandwidth
or make our internet connection slow. If they are little bit tech savvy then sure can
track out online activities as well. Even worse, cyber criminals can use your internet
connection to download/upload illegal materials leaving you prone to a legal action.
So it was not a rocket science to understand how many risks are involved if you do
not have a secure wireless network, now in this part of the article we are going to
discuss the ways you can secure wireless network.
WIRELESS NETWORK SECURITY
Wireless attacks have become a very common security issue when it comes to
networks. This is because such attacks can really get a lot of information that is being
sent across a network and use it to commit some crimes in other networks. Every
wireless network is very vulnerable to such kinds of attacks and it is therefore very
important that all the necessary security measures are taken so as to prevent the mess
that can be caused by such attacks. These attacks are normally carried out to target
information that is being shared through the networks. It is therefore very important
to know of such attacks so that one is in a position to identify it in case it happens.
Some of the common network attacks have been outlined below.
With the widespread use of internet, we are able to conduct our business processes
online and without being tied down by cables and wires. Wireless networks are one of
the relatively new technologies brought to our lives by the internet technologies.
They are easy to use, facilitate our business processes and mobilize our businesses.
On the downside, wireless networks are much more vulnerable to attacks and
intruders.
Commonly known as wireless network attacks, penetration and intrusion acts that
target wireless networks pose serious threats. Wireless network attacks aim to capture
the information sent across the network and/or intrude with the traffic of information.
WIRELESS NETWORK SECURITY
WIRELESS NETWORK SECURITY
1.Packet Sniffing:
When information is sent back and forth over a network, it is sent in what we call
packets. Since wireless traffic is sent over the air, it’s very easy to cap ture. Quite a lot
of traffic (FTP, HTTP, SNMP, etc.) is sent in the clear, meaning that there is no
encryption and files are in plain text for anyone to read. So using a tool
like Wireshark allows you to read data transfers in plain text! This can lead to stolen
passwords or leaks of sensitive information quite easily. Encrypted data can be
captured as well, but it’s obviously much harder for an attacker to decipher the
encrypted data packets.
3.Jamming:
4.Password Theft:
When communicating over wireless networks, think of how often you log into a
website. You send passwords out over the network, and if the site doesn’t use SSL or
TLS, that password is sitting in plain text for an attacker to read. There are even ways
to get around those encryption methods to steal the password. I’ll talk about this with
man in the middle attacks.
WIRELESS NETWORK SECURITY
It’s possible for hackers to trick communicating devices into sending their
transmissions to the attacker’s system. Here they can record the traffic to view later
(like in packet sniffing) and even change the contents of files. Various types of
malware can be inserted into these packets, e-mail content could be changed, or the
traffic could be dropped so that communication is blocked.
5.Jamming:
few examples of how this could benefit someone is through a business jamming their
competitors Wi-Fi signal. This is highly illegal (as are all these attacks), so businesses
would tend to shy away from it. If they got caught they would be facing serious
charges.
6.Bluetooth Attack:
There are a variety of Bluetooth exploits out there. These range from annoying pop
-up messages, to full control over the a victims Bluetooth enabled device.
7.War Driving:
War driving comes from an old term called war dialing, where people would dial
random phone numbers in search of modems. War driving is basically people driving
around looking for vulnerable APs to attack. People will even use drones to try and
hack APs on higher floors of a building. A company that owns multiple floors around
ten stories up might assume nobody is even in range to hack their wireless, but there
is no end to the creativity of hackers.
WIRELESS NETWORK SECURITY
Wireless Security
Wireless Internet access technology is being increasingly deployed in both office and
public environments, as well as by the Internet users at home. Wireless technologies,
in the simplest sense, enable one or more devices to communicate without physical
connections—without requiring network or peripheral cabling. Wireless technologies
use radio frequency transmissions as the means for transmitting data, whereas wired
technologies use cables.
security over WEP. Only clients who know a shared secret may connect to the
network.
Most network devices, including wireless access points, are pre-configured with
default administrator passwords to simplify setup. These default passwords are easily
available to obtain online, and so provide only marginal protection. Changing default
passwords makes it harder for attackers to access a device. Use and periodic changing
of complex passwords is your first line of defense in protecting your device.
2.Restrict access:
Only allow authorized users to access your network. Each piece of hardware
connected to a network has a media access control (MAC) address. You can restrict
access to your network by filtering these MAC addresses. Consult your user
documentation for specific information about enabling these features. You can also
utilize the “guest” account, which is a widely used feature on many wireless routers.
This feature allows you to grant wireless access to guests on a separate wireless
channel with a separate password, while maintaining the privacy of your primary
credentials.
Encrypting your wireless data prevents anyone who might be able to access your
network from viewing it. There are several encryption protocols available to provide
this protection. Wi-Fi Protected Access (WPA), WPA2, and WPA3 encrypt
information being transmitted between wireless routers and wireless devices. WPA3
is currently the strongest encryption. WPA and WPA2 are still available; however, it
is advisable to use equipment that specifically supports WPA3, as using the other
protocols could leave your network open to exploitation.
WIRELESS NETWORK SECURITY
To prevent outsiders from easily accessing your network, avoid publicizing your
SSID. All Wi-Fi routers allow users to protect their device’s SSID, which makes it
more difficult for attackers to find a network. At the very least, change your SSID to
something unique. Leaving it as the manufacturer’s default could allow a potential
attacker to identify the type of router and possibly exploit any known vulnerabilities.
5. Install a firewall:
Install antivirus software and keep your virus definitions up to date. Many antivirus
programs also have additional features that detect or protect against spyware and
adware.
File sharing between devices should be disabled when not needed. You should always
choose to only allow file sharing over home or work networks, never on public
networks. You may want to consider creating a dedicated directory for file sharing
and restrict access.
The manufacturer of your wireless access point will periodically release updates to
and patches for a device’s software and firmware. Be sure to check the
manufacturer’s website regularly for any updates or patches for your device.
WIRELESS NETWORK SECURITY
Many companies and organizations have a VPN. VPNs allow employees to connect
securely to their network when away from the office. VPNs encrypt connections at
the sending and receiving ends and keep out traffic that is not properly encrypted. If a
VPN is available to you, make sure you log onto it any time you need to use a public
wireless access point.
Many companies and organizations have a VPN. VPNs allow employees to connect
securely to their network when away from the office.
WIRELESS NETWORK SECURITY
1.Firewall:
2. Modem :
A modem (modulator-demodulator) is a network hardware device that
modulates one or more carrier wave signals to encode digital information for
transmission and demodulates signals to decode the transmitted information. The goal
is to produce a signal that can be transmitted easily and decoded to reproduce the
original digital data. Modems can be used with any means of transmitting analog
signals, from light emitting diodes to radio. A common type of modem is one that
turns the digital data of a computer transmission over telephone lines the receiver side
to recover the digital data.
4.Server:
5.Hub :
A hub is rectangular box that is used as the central object on which computers and
other devices are connected. To make this possible, a hub is equipped with small
holes
6. Routers:
Like a hub, a router is another type of device that acts as the central point among
computers and other devices that are part of a network Security.
WIRELESS NETWORK SECURITY
1.WEP.
2.WPA.
1.WEP stands for Wired Equivalent Privacy. WEP was designed to provide the same
level of security as wired networks. When you enable WEP, you set up a network
security key. This key encrypts the information that one computer sends to another
computer across your network. However, WEP security is relatively easy to crack.
When using WEP, all clients and APs on a wireless network use the same key to
encrypt and decrypt data. The key resides in the client in each AP on the network.
Since the 802.11 standard does not specify a key management protocol.15 The shared
key can be used for client authentication. This requires a four step process between
the AP and the client. This process is as follows:
3. The client encrypts the challenge phrase using the shared symmetric key and
transmits it to the AP.
WIRELESS NETWORK SECURITY
4. The AP then compares the client's response with its phrase; if there is a match, the
client is authorized otherwise the client is rejected.
There are a number of reasons for this great increase in attacks, but the main one is
that the nature of a wireless network is to provide easy access to end users, but this
ease of access creates a more open attack surface. Unlike a wired network that
requires an attacker to physically access part of the network, a wireless network only
requires that the attacker be in close proximity (and even this is relative). Also, there
is a general lack of knowledge and awareness of wireless networks.
Let’s cover the general basics of wireless security to gain some background
information.
Working in reverse, in using customer networks, you are giving up security in two
regards: you're connecting to a network that may or may not require a password that
anyone can obtain. You have no way to ascertain the security of the network or even
verify and validate that it is truly the network and not an "Evil Twin". You have no
way to make sure no one can intercept and read and/or modify your data.
Furthermore, while not dangerous yet still annoying, the stores can also monitor your
connections and dependent upon the fine print you click "OK" in order to connect,
they could query your device and get data about you. This data could be the apps you
have installed, location data, and others.
Public Wireless networks (for this, those with a Pre-Shared Key) are not much safer,
if at all. While they may not have the same intentions as retail stores, there is no level
of assurance or legal obligation for them to secure your device or data. Again, you
have no way to make sure no one can intercept and read and/or modify your data.
You should question why this network exists, especially if the connection is free. You
are probably the "product" via data mining (like retail stores above) or via
advertising.
Open Wireless networks are bastions for malicious intent. While some people
genuinely want to share and others are ignorant as to the possible outcomes or the
ability to secure the networks, others blatantly leave the networks open. Again, you
have no way to make sure no one can intercept and read and/or modify your data.
7.Advantages
1.Protect Data:
Most of the attack on the network comes from internet. There are hackers who are
experts in this and then there are virus attacks. If careless, they can play with a lot of
information available in the network. The network security can prevent these attacks
from harming the computers.
3.Levels of access:
The security software gives different levels of access to different users. The
authentication of the user is followed by the authorization technique where it is
checked whether the user is authorized to access certain resource. You may have seen
certain shared documents password protected for security. The software clearly
knows which resources are accessible by whom.
WIRELESS NETWORK SECURITY
4.Centrally controlled:
Unlike the desktop security software, the network security software is controlled by a
central user called network administrator. While the former is prone to worms and
virus attacks, the latter can prevent the hackers before they damage anything. This is
because the software is installed in a machine having no internet.
5.Centralized updates:
It is very important that the anti-virus software is timely updated. An old version may
not offer you enough security against attackers. But it is not guaranteed that every
user of the network follows it religiously. A network security system which is
centralized offers this advantage of timely updates without even the knowledge of the
individuals.
8 . Disadvantages
WIRELESS NETWORK SECURITY
Network security is a real boon to the users to ensure the security of their data. While
it has many advantages, it has lesser disadvantages. Let us discuss some of them.
The set up of a network security system can be a bit expensive. Purchasing the
software, installing it etc can become costly especially for smaller networks. Here we
are not talking about a single computer, but a network of computers storing massive
data. So, the security being of prime importance will definitely cost more. It cannot
be ignored at any cost.
2. Time consuming:
To manage large networks is not an easy task. It requires highly skilled technicians
who can handle any security issue that arises. A network administrator needs to be
employed to ensure smooth working of the network. He must be trained adequately to
meet the requirement.
4.Careless admin:
When the best software is installed and everything required is done, it is natural for
the admin to be careless at times. It is his job to check the logs regularly to keep a
check on the malicious users. But sometimes, he just trusts the system and that is
when the attack happens.
9. Conclusion
WIRELESS NETWORK SECURITY
In conclusion, wireless network security globally is something that people can expect
as technology advances. Wireless network security has a lot of benefits and can make
the world a lot more efficient. It does have concerns though as with every other new
advancement that is made in today’s world.
The issues with security regarding access to a person’s personal information or the
negative impact that it may seem to have on society are a few things that are holding
back the progress that wireless technology could be making. With more research and
experiments conducted, the problems associated with wireless network security can
be reduced and make it a more significant part of the world.
Wireless networks, which by their nature, facilitate access to the radio, are more
vulnerable than wired networks and need to encrypt communications to deal with
sniffing and continuously checking the identity of the mobile nodes. The mobility
factor adds more challenges to security, namely monitoring and maintenance of
secure traffic transport of mobile nodes.
10. REFERENCES
1. https://www.techopedia.com/definition/29915/wireless-network-security
2. https://phoenixts.com/blog/types-of-wireless-network-attacks/
3. https://www.shireeninc.com/types-of-wireless-networks/
4 . http://isc2central.blogspot.com/2018/04/advantages-and-disadvantages-of-
network.html