StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless Technology Security and Its Types - Essay Example

Cite this document
Summary
This essay "Wireless Technology Security and Its Types" discusses three main types of wireless networks and types and security protocols namely, Wireless Wide Area Networks (WWAN), Wireless Local Area Network (WLAN) and Wireless Personal Area Network (WPAN). …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Wireless Technology Security and Its Types
Read Text Preview

Extract of sample "Wireless Technology Security and Its Types"

Wireless Technology Security Wireless Technology Security A wireless network refers to the type of computer network not connectedby any cables (Tse & Viswanath, 2005). It allows users access to information, applications and ability to communicate wirelessly, the air being the medium. It facilitates easy movement and the extension of common applications to several areas of a building, town or the world minus costly cable installations. Their implementation and administration is based on radio communication, which occurs at the physical layer of the Open Systems Interconnection (OSI) type of network structure (Rappaport, 2002). This paper will discuss various wireless network types and security protocols. Although with several variations, basically, there are three main types of wireless networks namely, Wireless Wide Area Networks (WWAN), Wireless Local Area Network (WLAN) and Wireless Personal Area Network (WPAN) (Pahlavan & Levesque, 1995). Since setting up a wireless network must include means that ensure only authorized users can access and use it, the paper will also look at the security risks government and businesses run by using wireless networks with their associated security measures. WPAN These are low range networks used for linking devices that are generally within a person’s reach in relatively small areas. As cable replacement for peripheral devices, WPANs are commonly used in interconnection of printers, personal assistants, headsets and scanners in the absence of hard wired connections (Pahlavan & Krishnamurthy, 2009). The key technologies in WPAN are Bluetooth and infrared. Bluetooth connectivity can have a 10 Mbps throughput in a range of up to 100 meters without using an amplifier. With the integration of WiFi in some electronic consumer devices and the highly efficient power consumption of Bluetooth technology, the popularity of WPAN is growing (Pahlavan & Krishnamurthy, 2009). Infrared technology can establish wireless connections speeds of a few Mbps over several meters. WLAN A WLAN connects devices over short distances such as in a library, coffee shop, and university campus or aboard an airplane or train, and eventually provides connection to the broader internet via an access point (Geier, 2002). Within the WLAN, all components connecting to a wireless medium are known as stations and are equipped with interface controllers. The stations are broadly categorized into two; clients and access points (APs). Wireless clients are made up of mobile devices like IP phones, personal digital assistants and laptops. They also include fixed devices like workstations and desktop computers fitted with interfaces for the wireless network. On the other hand, APs serve as the wireless network’s base stations and are normally routers. In their function, they receive and transmit radio frequencies from and to the wireless enabled devices, enabling them to communicate with each other. Within a WLAN, users who do not need internet access may create a temporary network among themselves without using the access points. Making use of spread spectrum technology, a WLAN lets users stay connected to the network even when they move around, so long as they are still within the local area of coverage (Geier, 2002). For networks or computers placed in two relatively distant points, the fixed wireless technology makes use of point to point links over a dedicated microwave connection in a line of sight path. An example of such fixed wireless technology occurs in the linking of networks located in several buildings across a city. WLANs offer benefits like reduced ownership costs (except the high initial acquisition cost), quick installation, scalability and flexibility. Its growth is aided by popularity and affordability of laptops and other handheld devices. With public APs, passwords or registrations are not often required to link to the network. WWAN Typically, WWANs offer coverage over wide areas like between bordering cities, towns or neighborhoods. They connect an organization’s branch offices, or the internet access system of the public, and are based upon point to point microwave connections that use parabolic dishes, unlike the unidirectional antennas use by smaller networks (Goldsmith, 2005). A WWAN’s large sizes needs more advanced technology compared to WLANs. They transmit data in the form of video streaming, web pages and telephone calls using cellular networks of mobile telecommunication. With APs, base station gateways and wireless bridging relays, WWANs allow users with laptops fitted with WWAN cards to connect to virtual private networks, read email and surf the web from any location inside the cellular service’s regional boundaries. Access may be facilitated by payment of monthly connection fees or a pay-per-need basis. Certain models of mobile phones may also be connected to laptops via a Universal Serial Bus cable (USB) and act as modems to link to a WWAN (Pollino & Schiffman, 2002). However, extra costs may be incurred and connection speeds slowed down. Security and Vulnerability Issues Wireless networks are a relatively new concept and as is the case with most new technologies, the beginning is always marred with insecurity and unreliability (Everard, Gorochow, Stoneman & Warne, 2004). As opposed to wired networks that transmit traffic via physically private and dedicated lines, wireless networks transmit over shared airspace. They are prone to interference caused by other traffic, hence the growing need for security measures. Security matters are more urgent to government and business enterprises, which are the largest users of wireless networks, especially the WLAN and WWAN. The common vulnerabilities that users of wireless networks are exposed to include; espionage, eavesdropping and internal vulnerabilities (Pollino & Schiffman, 2002). The internal vulnerabilities include rouge access points, accidental associations, social engineering and insecure network configurations. Eavesdroppers may pick unencrypted information from radio waves. This leads to loss of sensitive and confidential information of a business to competitors through the process of corporate espionage. Likewise, the security of a nation can be compromised if information ended up with the wrong recipients (Goldsmith, 2005). Hackers and unauthorized users also get onto others’ networks to steal bandwidth, which also slows down the connection. They also use the government’s or a business’ internet and data allowance to download illegal or copyright material. An insider may also plug an AP into a live LAN socket without the administrator’s knowledge or permission. Such live LAN sockets that the administrator may not be aware of are the rogue APs. A study conducted in 2001 established that not less than 20 percent of business enterprises have rogue APs within their networks (Pollino & Schiffman, 2002). This may be likened to social engineering whereby an imposter from outside gains access into a business premises or government office posing as a service provider representative. Such a person is able to collect user names and passwords as well as plug in an insecure AP, with modified settings not to broadcast its service set identifier (SSID), into the network. He will then be able to access all the organization’s secure data documents when within 300 meters from the building. Government secrets can be accessed by enemies and a business may be swindled to bankruptcy. Accidental associations happen when neighboring wireless networks are set up, knowingly or unknowingly, with similar SSIDs and within each others’ range of wireless devices. A user of one network may then accidentally associate with the neighboring one and disclose passwords and sensitive information. Insecure network configurations also compromise the users’ security. Making Wireless Networks Secure Securing wireless networks in comparison to hardwired networks is a greater challenge to administrators (Geier, 2002). It may not be possible to totally secure a wireless network environment, but the possibility of security breaches and damage can be controlled and minimized by use of various methods available in the market. WiFi Protected Access (WPA) WPA provides security by encrypting information. It further checks network security keys to ensure that they have not been altered or modified (Pahlavan & Krishnamurthy, 2009). It also has authentication procedures that only let authorized users onto the network. WPA occurs in two types of authentication, which are WPA and WPA2. The later offers more security features than the former, but both face compatibility challenges with older APs and routers. The two are designed for use with 802.1X authentication servers in which a different key is distributed to each user in a protocol known as WPA Enterprise or WPA2 Enterprise. It may also be implemented in a pre shared key mode (PSK), with all users assigned the same password or passphrase. This type is known as WPA Personal or WPA2 Personal. Wired Equivalent Privacy (WEP) This type of security is older than WPA and may be found in the market to offer support and security to older models of APs and routers that WPA does not support (Molisch, 2005). By enabling WEP, a network security key that encrypts information sent between computers is set up. Due to it being an older security measure, it may contain security holes but will slowdown attackers when other ways are not practically possible. 802.1X Authentication WPA is 802.11i’s subset. This implies 802.11i contains all the capabilities of WPA and more features of security (Griffith, 2004). The key difference between WPA and 802.11i is that the later uses Advanced Encryption Standard (AES) for encryption of data packets. United State’s government agencies use AES algorithm for encryption. However, to be able to use AES in WEP only network interfaces, replacing the wireless network devices is necessary because software upgrade only will not support it. Other quick but necessary securing methods may be implemented during setup of a wireless network (Goldsmith, 2005). One way is to change the default SSID. Each AP and router comes with the manufacturer’s default SSID and changing it poses a challenge to hackers when they try to figure out the device type. Changing default, generic passwords makes it difficult for hackers to modify settings to their preferences. Finally, all drivers on wireless equipment should be kept updated. It helps in patching up existing security risks. References Everard, B., Gorochow, T., Stoneman, G., & Warne, M. (2004). Wireless network security issues. Retrieved from http://www.dcs.warwick.ac.uk/~nikos/cs406/Wirelessw/ Geier, J. (2002). 802.1X offers authentication and key management. Retrieved from http://www.wi-fiplanet.com/tutorials/article.php/1041171/ Goldsmith, A. (2005). Wireless communications. Cambridge: Cambridge University Press. Griffith, E. (2004). 802.11i Security specification finalized. Retrieved from http://www.wi- fiplanet.com/news/article.php/3373441 Molisch, A. (2005). Wireless communications. New York: Wiley. Pahlavan, K., & Krishnamurthy, P. (2009). Networking fundamentals – Wide, local and personal area communications. New York: Wiley. Pahlavan, K., & Levesque, A. (1995). Wireless information networks. New York: Wiley. Pollino, D., & Schiffman, M. (2002). 802.11: Use, misuse and the need for a robust security toolkit. Retrieved from http://www.cansecwest.com/core02/Cansec/ Rappaport, T. (2002). Wireless communications: Principles and practice. New Jersey: Prentice. Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communication. Cambridge: Cambridge University Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Wireless Technology Security and Its Types Essay Example | Topics and Well Written Essays - 1500 words - 1, n.d.)
Wireless Technology Security and Its Types Essay Example | Topics and Well Written Essays - 1500 words - 1. https://studentshare.org/information-technology/1798419-wireless-technology-security
(Wireless Technology Security and Its Types Essay Example | Topics and Well Written Essays - 1500 Words - 1)
Wireless Technology Security and Its Types Essay Example | Topics and Well Written Essays - 1500 Words - 1. https://studentshare.org/information-technology/1798419-wireless-technology-security.
“Wireless Technology Security and Its Types Essay Example | Topics and Well Written Essays - 1500 Words - 1”. https://studentshare.org/information-technology/1798419-wireless-technology-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless Technology Security and Its Types

Create a Design for a Wireless Campus Area Network

‘Access points' are the deployed to connect devices equipped with wireless technology.... However, distance varies from different model types and the technology adopted.... 1n broadcast signals everywhere in its limited spectrum.... 1n Wi-Fi solution, FSO networks are more efficient in terms of security, deployment and support for high data transfer rates.... Full Paper Title Name University Introduction Internet is the fastest rising technology and has produced endless opportunities....
2 Pages (500 words) Essay

CheckPoint: Types of Networks

For instance LAN in designed to aid communication between employees of an organization working in physically close locations such as in offices within a building where as WAN is used to connect physically remote locations which is why WLAN uses wireless technology and remote bridges to make connection.... Ans: LANs, WANs, CANs, MANs, and HANs are methods to provide three types of computer networks that are the internet, intranet and extranet.... Windows is closed source nature which means that its internal systems can only be accessed by a few windows employee where as other operating systems are opened source which suggests that anyone who has the knowledge to modify the system can do that....
3 Pages (750 words) Coursework

Introductory Computer Usage 1

Bluetooth wireless technology has fast become one most popular technology.... Hackers ogled high-powered antennas that can pick up signals from over a mile away,… Hacking the Defcon conferences own wireless network proved popular as well – organisers said they fended off 1 200 attempts to compromise network security (REUTERS, 2005).... This is not one case but wireless security has never been able to provide any The other fact of the matter is that people are rarely aware of the technological advancements and their security concerns....
4 Pages (1000 words) Essay

Class student dicussions answers

Remember that WEP gave rise to WPA, WPA2 and 802i and its creation should never be comprised at all.... Technologists got information about its weakness and improved upon the encryption types which followed.... It is true that the encryption is less secure as compared to its predecessor, WPA and WPA2, but we should be grateful of its creation since it is the basis of the encryptions technologies which followed.... This makes it easily hacked and cannot guarantee security within one's business premise....
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us