A DISCUSSION OF WIRELESS SECURITY TECHNOLOGIES (original) (raw)
Related papers
Evolution of wireless LAN security architecture to IEEE 802.11 i (WPA2)
Communication Systems and …, 2007
Wireless LANs have gone through rapid changes with respect to their security architecture in recent years. One view has been to incorporate WLANs under already existing VPN umbrellas and to view them merely as an alternative access method -thus preserving existing VPN infrastructure. Another view has been to address the security of the airwaves which has been demonstrated to be extremely vulnerable. The evolution of security standardisation based upon the work of the IEEE has evolved from WEP to WPA which introduced new key management and integrity mechanisms through to WAP2 (IEEE 802.11i) which maintains the management and integrity mechanisms of WPA but introduces AES encryption as well as moving much of the security functionality to the hardware. This paper traces the evolution and development of this new WLAN security architecture.
ON 802.11 Standard and the WiFi Network Security
The paper presents an overview of papers and reports which address various aspects of the security in the 802.11 standard. A sequence of vulnerabilities in the current version of 802.11 is given in order to emphasize the reasons claimed by the potential customers in not implementing WiFi networks yet. Few suggestions with topics to be implemented in the standard are presented, including security audit methodologies, general and functional security policies. Having this policies in place, 802.11 standard network will be prepared better for a security audit on national security standards (Sarbanes-Oxley, US HIPPA). Implementation examples are given in order to state the security level reached today. This article aims to be an open discussion on the improvements needed by the standard to meet specified performances and security requirements.
INVESTIGATION INTO IEEE 802.11 SECURITY ISSUES AFFECTING WIRELESS NETWORKS
Wireless networking is one of the exciting developments in the world of networking technology. After the introduction of IEEE 802.11 Ethernet standard, Wi-Fi has become the most widely adopted wireless networking type on the wireless network environment. Since wireless networking is easy to deploy and upgrade and with decent data rate available today at low cost, implementation of wireless networking is growing all over the place. Organizations and enterprises are switching from the traditional wired networks to wireless networking. Wireless can serve in many capacities, from a simple extension to a distribution point. One of the leading glitches with wireless networking is that, the wireless networking devices provide no security as they come out of their boxes. Considering the fact that wireless networks are built on a shared medium and data packets float through the air on radio waves, security cannot be overemphasized when dealing with wireless networking. It is arguable that many network users don't have procedures when they deploy their WLAN for the first time. It is the dearth of procedures that help attackers get into any networks they want. This paper seeks to demystify the security issues of the IEEE 802.11 wireless standards. The paper goes on to address these security concerns and points out the method used to secure a wireless network.
Investigation into IEEE 802.11 Security Issues affecting Wireless Network
Wireless networking is one of the exciting developments in the world of networking technology. After the introduction of IEEE 802.11 Ethernet standard, Wi-Fi has become the most widely adopted wireless networking type on the wireless network environment. Since wireless networking is easy to deploy and upgrade and with decent data rate available today at low cost, implementation of wireless networking is growing all over the place. Organizations and enterprises are switching from the traditional wired networks to wireless networking. Wireless can serve in many capacities, from a simple extension to a distribution point. One of the leading glitches with wireless networking is that, the wireless networking devices provide no security as they come out of their boxes. Considering the fact that wireless networks are built on a shared medium and data packets float through the air on radio waves, security cannot be overemphasized when dealing with wireless networking. It is arguable that many network users don't have procedures when they deploy their WLAN for the first time. It is the dearth of procedures that help attackers get into any networks they want. This paper seeks to demystify the security issues of the IEEE 802.11 wireless standards. The paper goes on to address these security concerns and points out the method used to secure a wireless network.
Wireless LAN Security: The IEEE 802.11 Risks and Technical Challenges
Abstract— Wireless local area networks (LANs) are playing a major role in the information technology revolution. They have found their way into a wide variety of markets including financial sectors, corporations, health care, and education.The rapid deployment of wireless LANs is testimony to the inherent benefits of this technology. Unfortunately, most wireless deployments are, at this time, fundamentally insecure. This is not an exaggeration. It is an accurate assessment of the reality of the current state of the security of wireless 802.11-based environments.Because of its transmission characteristic, many security problems have set in. This paper aims to introduce the security mechanism of the wireless LAN and points out the shortcoming of it. Index Terms—About four key words or phrases in alphabetical order, separated by commas.
A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)
Computer Science and …, 2009
Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in ICFCC 2009 Malaysia and ICCDA 2009 Singapore [1] [2], we explained the structure of WEP and WPA as first and second wireless security protocols and discussed all their versions, problems and improvements. Now, we try to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness. Finally we make a comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology. In the next phase we hope that we will publish a complete comparison among wireless security techniques by add the WiMax security technique and make a whole comparison among all security protocols in this area.
IEEE 802.11 wireless LAN security overview
IJCSNS, 2006
Summary Wireless Local Area Networks (WLANs) are cost effective and desirable gateways to mobile computing. They allow computers to be mobile, cable less and communicate with speeds close to the speeds of wired LANs. These features came with expensive price to ...
A comparison between wireless LAN security protocols
The paper presents an analysis of the WEP, WPA and IEEE 802.11i protocols, from the WLANs security requirements point of view. Then, they are compared by two criteria: the network security level that each one assures and their influence on the network performance.
IEEE 802.11 - Security Concerns
2017
WLANs have become the network of choice over the years due to its many benefits however due to this very reason many threats have become associated to it and is the focus of this paper. The paper also highlights mitigation techniques to tackle the listed threats along with some best practices.