Security in Wireless Local Area Networks (original) (raw)

Wireless Security protocols Wi-Fi (802.11) and WiMAX (802.16)

Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user’s usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in some conferences [1][2][3][4], we explained the structure of WEP, WPA and WPA2 as first, second and third Wi-Fi security protocols and discussed all their versions, vulnerabilities and lacks and improvements. Now, in this paper we try to peruse the weaknesses of WPA2 as the last security protocol in Wi-Fi category and then try to make a whole picture of Wi...

IEEE 802.11 wireless LAN security overview

IJCSNS, 2006

Summary Wireless Local Area Networks (WLANs) are cost effective and desirable gateways to mobile computing. They allow computers to be mobile, cable less and communicate with speeds close to the speeds of wired LANs. These features came with expensive price to ...

A comparison between wireless LAN security protocols

The paper presents an analysis of the WEP, WPA and IEEE 802.11i protocols, from the WLANs security requirements point of view. Then, they are compared by two criteria: the network security level that each one assures and their influence on the network performance.

WIRELESS LAN SECURITY (IEEE 802.11b

Special thanks to Sadia Hamid Kazi, Senior Lecturer, BRAC University for guide us to complete this work and give us time out of her busy schedules to consider this work. We also acknowledge Risat Mahmud Pathan, Senior Lecturer, BRAC University as giving us the preliminary idea of wireless network.

Wireless LAN-802.11

International Research Journal of Computer Science

Communication is the basic need and backbone for development of any society. Societal development and advancement in the electronics & technology led to the development of Wireless based Systems & has become vital for the modern existence. Wireless Local Area Network (WLAN) is the best example for the same. Popularity of the Wireless Local Area Networks (WLANs) are in increasing trend as they are fast, flexible, cost effective, and easy to use. Application & uses of the WLAN has led some security challenges also & choice of security protocol is one of the typical tasks. In general, any information system incorporating wireless technology should fulfil some basic security objectives. The typical taxonomy of security properties can be described by confidentiality, integrity, and availability (CIA).In wireless communication, data rate is increasing drastically due to advancement in technology at a massive scale. In this paper, we review and summarize IEEE 802.11 protocol architecture, component of WLAN, and security issues in WLAN etc.

INVESTIGATION INTO IEEE 802.11 SECURITY ISSUES AFFECTING WIRELESS NETWORKS

Wireless networking is one of the exciting developments in the world of networking technology. After the introduction of IEEE 802.11 Ethernet standard, Wi-Fi has become the most widely adopted wireless networking type on the wireless network environment. Since wireless networking is easy to deploy and upgrade and with decent data rate available today at low cost, implementation of wireless networking is growing all over the place. Organizations and enterprises are switching from the traditional wired networks to wireless networking. Wireless can serve in many capacities, from a simple extension to a distribution point. One of the leading glitches with wireless networking is that, the wireless networking devices provide no security as they come out of their boxes. Considering the fact that wireless networks are built on a shared medium and data packets float through the air on radio waves, security cannot be overemphasized when dealing with wireless networking. It is arguable that many network users don't have procedures when they deploy their WLAN for the first time. It is the dearth of procedures that help attackers get into any networks they want. This paper seeks to demystify the security issues of the IEEE 802.11 wireless standards. The paper goes on to address these security concerns and points out the method used to secure a wireless network.

Investigation into IEEE 802.11 Security Issues affecting Wireless Network

Wireless networking is one of the exciting developments in the world of networking technology. After the introduction of IEEE 802.11 Ethernet standard, Wi-Fi has become the most widely adopted wireless networking type on the wireless network environment. Since wireless networking is easy to deploy and upgrade and with decent data rate available today at low cost, implementation of wireless networking is growing all over the place. Organizations and enterprises are switching from the traditional wired networks to wireless networking. Wireless can serve in many capacities, from a simple extension to a distribution point. One of the leading glitches with wireless networking is that, the wireless networking devices provide no security as they come out of their boxes. Considering the fact that wireless networks are built on a shared medium and data packets float through the air on radio waves, security cannot be overemphasized when dealing with wireless networking. It is arguable that many network users don't have procedures when they deploy their WLAN for the first time. It is the dearth of procedures that help attackers get into any networks they want. This paper seeks to demystify the security issues of the IEEE 802.11 wireless standards. The paper goes on to address these security concerns and points out the method used to secure a wireless network.

A Survey on Wireless Security Protocols Wi-Fi (802.11) and WiMAX (802.16)

International Conference on Computer Engineering and Technology, 3rd (ICCET 2011), 2011

Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in ICFCC Malaysia [1], ICCDA Singapore [2], ICCSIT China [3]. We explained the structure of WEP, WPA and WPA2 as first, second and third Wi-Fi security protocols and discussed all their versions, vulnerabilities and lacks and improvements. Now, in this paper we try to peruse the weaknesses of WPA2 as the last security protocol in Wi-Fi category and then try to make a whole picture of WiMax as a replacement of previous Wireless security protocols.