StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless technology security - Research Paper Example

Cite this document
Summary
Wireless Technology Security A wireless network refers to the type of computer network not connected by any cables (Tse & Viswanath, 2005). It allows users access to information, applications and ability to communicate wirelessly, the air being the medium…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Wireless technology security
Read Text Preview

Extract of sample "Wireless technology security"

? Wireless Technology Security Wireless Technology Security A wireless network refers to the type of computer network not connected by any cables (Tse & Viswanath, 2005). It allows users access to information, applications and ability to communicate wirelessly, the air being the medium. It facilitates easy movement and the extension of common applications to several areas of a building, town or the world minus costly cable installations. Their implementation and administration is based on radio communication, which occurs at the physical layer of the Open Systems Interconnection (OSI) type of network structure (Rappaport, 2002). This paper will discuss various wireless network types and security protocols. Although with several variations, basically, there are three main types of wireless networks namely, Wireless Wide Area Networks (WWAN), Wireless Local Area Network (WLAN) and Wireless Personal Area Network (WPAN) (Pahlavan & Levesque, 1995). Since setting up a wireless network must include means that ensure only authorized users can access and use it, the paper will also look at the security risks government and businesses run by using wireless networks with their associated security measures. WPAN These are low range networks used for linking devices that are generally within a person’s reach in relatively small areas. As cable replacement for peripheral devices, WPANs are commonly used in interconnection of printers, personal assistants, headsets and scanners in the absence of hard wired connections (Pahlavan & Krishnamurthy, 2009). The key technologies in WPAN are Bluetooth and infrared. Bluetooth connectivity can have a 10 Mbps throughput in a range of up to 100 meters without using an amplifier. With the integration of WiFi in some electronic consumer devices and the highly efficient power consumption of Bluetooth technology, the popularity of WPAN is growing (Pahlavan & Krishnamurthy, 2009). Infrared technology can establish wireless connections speeds of a few Mbps over several meters. WLAN A WLAN connects devices over short distances such as in a library, coffee shop, and university campus or aboard an airplane or train, and eventually provides connection to the broader internet via an access point (Geier, 2002). Within the WLAN, all components connecting to a wireless medium are known as stations and are equipped with interface controllers. The stations are broadly categorized into two; clients and access points (APs). Wireless clients are made up of mobile devices like IP phones, personal digital assistants and laptops. They also include fixed devices like workstations and desktop computers fitted with interfaces for the wireless network. On the other hand, APs serve as the wireless network’s base stations and are normally routers. In their function, they receive and transmit radio frequencies from and to the wireless enabled devices, enabling them to communicate with each other. Within a WLAN, users who do not need internet access may create a temporary network among themselves without using the access points. Making use of spread spectrum technology, a WLAN lets users stay connected to the network even when they move around, so long as they are still within the local area of coverage (Geier, 2002). For networks or computers placed in two relatively distant points, the fixed wireless technology makes use of point to point links over a dedicated microwave connection in a line of sight path. An example of such fixed wireless technology occurs in the linking of networks located in several buildings across a city. WLANs offer benefits like reduced ownership costs (except the high initial acquisition cost), quick installation, scalability and flexibility. Its growth is aided by popularity and affordability of laptops and other handheld devices. With public APs, passwords or registrations are not often required to link to the network. WWAN Typically, WWANs offer coverage over wide areas like between bordering cities, towns or neighborhoods. They connect an organization’s branch offices, or the internet access system of the public, and are based upon point to point microwave connections that use parabolic dishes, unlike the unidirectional antennas use by smaller networks (Goldsmith, 2005). A WWAN’s large sizes needs more advanced technology compared to WLANs. They transmit data in the form of video streaming, web pages and telephone calls using cellular networks of mobile telecommunication. With APs, base station gateways and wireless bridging relays, WWANs allow users with laptops fitted with WWAN cards to connect to virtual private networks, read email and surf the web from any location inside the cellular service’s regional boundaries. Access may be facilitated by payment of monthly connection fees or a pay-per-need basis. Certain models of mobile phones may also be connected to laptops via a Universal Serial Bus cable (USB) and act as modems to link to a WWAN (Pollino & Schiffman, 2002). However, extra costs may be incurred and connection speeds slowed down. Security and Vulnerability Issues Wireless networks are a relatively new concept and as is the case with most new technologies, the beginning is always marred with insecurity and unreliability (Everard, Gorochow, Stoneman & Warne, 2004). As opposed to wired networks that transmit traffic via physically private and dedicated lines, wireless networks transmit over shared airspace. They are prone to interference caused by other traffic, hence the growing need for security measures. Security matters are more urgent to government and business enterprises, which are the largest users of wireless networks, especially the WLAN and WWAN. The common vulnerabilities that users of wireless networks are exposed to include; espionage, eavesdropping and internal vulnerabilities (Pollino & Schiffman, 2002). The internal vulnerabilities include rouge access points, accidental associations, social engineering and insecure network configurations. Eavesdroppers may pick unencrypted information from radio waves. This leads to loss of sensitive and confidential information of a business to competitors through the process of corporate espionage. Likewise, the security of a nation can be compromised if information ended up with the wrong recipients (Goldsmith, 2005). Hackers and unauthorized users also get onto others’ networks to steal bandwidth, which also slows down the connection. They also use the government’s or a business’ internet and data allowance to download illegal or copyright material. An insider may also plug an AP into a live LAN socket without the administrator’s knowledge or permission. Such live LAN sockets that the administrator may not be aware of are the rogue APs. A study conducted in 2001 established that not less than 20 percent of business enterprises have rogue APs within their networks (Pollino & Schiffman, 2002). This may be likened to social engineering whereby an imposter from outside gains access into a business premises or government office posing as a service provider representative. Such a person is able to collect user names and passwords as well as plug in an insecure AP, with modified settings not to broadcast its service set identifier (SSID), into the network. He will then be able to access all the organization’s secure data documents when within 300 meters from the building. Government secrets can be accessed by enemies and a business may be swindled to bankruptcy. Accidental associations happen when neighboring wireless networks are set up, knowingly or unknowingly, with similar SSIDs and within each others’ range of wireless devices. A user of one network may then accidentally associate with the neighboring one and disclose passwords and sensitive information. Insecure network configurations also compromise the users’ security. Making Wireless Networks Secure Securing wireless networks in comparison to hardwired networks is a greater challenge to administrators (Geier, 2002). It may not be possible to totally secure a wireless network environment, but the possibility of security breaches and damage can be controlled and minimized by use of various methods available in the market. WiFi Protected Access (WPA) WPA provides security by encrypting information. It further checks network security keys to ensure that they have not been altered or modified (Pahlavan & Krishnamurthy, 2009). It also has authentication procedures that only let authorized users onto the network. WPA occurs in two types of authentication, which are WPA and WPA2. The later offers more security features than the former, but both face compatibility challenges with older APs and routers. The two are designed for use with 802.1X authentication servers in which a different key is distributed to each user in a protocol known as WPA Enterprise or WPA2 Enterprise. It may also be implemented in a pre shared key mode (PSK), with all users assigned the same password or passphrase. This type is known as WPA Personal or WPA2 Personal. Wired Equivalent Privacy (WEP) This type of security is older than WPA and may be found in the market to offer support and security to older models of APs and routers that WPA does not support (Molisch, 2005). By enabling WEP, a network security key that encrypts information sent between computers is set up. Due to it being an older security measure, it may contain security holes but will slowdown attackers when other ways are not practically possible. 802.1X Authentication WPA is 802.11i’s subset. This implies 802.11i contains all the capabilities of WPA and more features of security (Griffith, 2004). The key difference between WPA and 802.11i is that the later uses Advanced Encryption Standard (AES) for encryption of data packets. United State’s government agencies use AES algorithm for encryption. However, to be able to use AES in WEP only network interfaces, replacing the wireless network devices is necessary because software upgrade only will not support it. Other quick but necessary securing methods may be implemented during setup of a wireless network (Goldsmith, 2005). One way is to change the default SSID. Each AP and router comes with the manufacturer’s default SSID and changing it poses a challenge to hackers when they try to figure out the device type. Changing default, generic passwords makes it difficult for hackers to modify settings to their preferences. Finally, all drivers on wireless equipment should be kept updated. It helps in patching up existing security risks. References Everard, B., Gorochow, T., Stoneman, G., & Warne, M. (2004). Wireless network security issues. Retrieved from http://www.dcs.warwick.ac.uk/~nikos/cs406/Wirelessw/ Geier, J. (2002). 802.1X offers authentication and key management. Retrieved from http://www.wi-fiplanet.com/tutorials/article.php/1041171/ Goldsmith, A. (2005). Wireless communications. Cambridge: Cambridge University Press. Griffith, E. (2004). 802.11i Security specification finalized. Retrieved from http://www.wi- fiplanet.com/news/article.php/3373441 Molisch, A. (2005). Wireless communications. New York: Wiley. Pahlavan, K., & Krishnamurthy, P. (2009). Networking fundamentals – Wide, local and personal area communications. New York: Wiley. Pahlavan, K., & Levesque, A. (1995). Wireless information networks. New York: Wiley. Pollino, D., & Schiffman, M. (2002). 802.11: Use, misuse and the need for a robust security toolkit. Retrieved from http://www.cansecwest.com/core02/Cansec/ Rappaport, T. (2002). Wireless communications: Principles and practice. New Jersey: Prentice. Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communication. Cambridge: Cambridge University Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless technology security Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Wireless technology security Research Paper Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1471193-wireless-technology-security
(Wireless Technology Security Research Paper Example | Topics and Well Written Essays - 1500 Words)
Wireless Technology Security Research Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1471193-wireless-technology-security.
“Wireless Technology Security Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1471193-wireless-technology-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless technology security

The latest technology in wireless

wireless technology has accomplished a shining impression on people and quickly has won accepted agreement wide-reaching.... Even though the wireless basis was placed more than a century ago, up to date wireless technology corresponds to a development of products and standards.... The main aim of this paper is to conduct a detailed analysis of the latest technology improvements in the wireless multimedia communications.... This technology also facilitates you to check your email as you take a trip all the way through your town or other countries....
4 Pages (1000 words) Essay

Wi-Fi Technology: Wireless Fidelity

This easiness also allowed the hackers and malicious users to compromise the security of wireless networks.... Wireless Networks use certain security measure to encrypt their communications data.... An essay "Wi-Fi technology: Wireless Fidelity" outlines that it was originally designed to allow network elements to roam in warehouses and manufacturing facilities without getting out of reach of the connected network and without being subjected to cumbersomeness of wired network elements....
10 Pages (2500 words) Essay

Wireless Network Design

While interface which results in packet errors and security concerns are some of the shortcomings of wireless networks.... The safety and security concerns of the data on the internet must be well addressed.... Transmission technology for wireless networks The 802.... This papper ''wireless Network Design'' tells that The wireless network is where users access the internet without using cables.... hellip; The users have different operating systems but are still able to connect via the wireless network....
4 Pages (1000 words) Essay

Wireless hacking leads to corporation security breaching

Wireless hacking leads to corporation security breaching Wireless Hacking Leads To Corporation security Breaching In the world where everything is digitalized and the world is transformed into a global village, the track of big corporations and their transactions is kept by small computerized numerical pin codes that protect both the administrator and the customer.... security breaches are a very important issue in the information technology world today since, everyone relies on the computers to safeguard their assets....
2 Pages (500 words) Essay

Designing a Wireless Communications and Computing Network System with Wireless Security

This paper "Designing a Wireless Communications and Computing Network System with Wireless security and Smart Mobile Antenna Technology" focuses on the need for a seamless integration with macro-cellular wireless communication systems with the in-building wireless communication system is prevalent.... Similarly, Bluetooth technology is also prevalent, apparently with limited connectivity with other existing systems.... Besides, businesses and the guests expect the hotel to provide efficient personalised telephony with a direct line, a personal mailbox, wireless internet connections, integrated billing functions....
14 Pages (3500 words) Research Paper

Wireless Technology Security and Its Types

This essay "Wireless technology security and Its Types" discusses three main types of wireless networks and types and security protocols namely, Wireless Wide Area Networks (WWAN), Wireless Local Area Network (WLAN) and Wireless Personal Area Network (WPAN).... nbsp;… Since setting up a wireless network must include means that ensure only authorized users can access and use it, the paper will also look at the security risks government and businesses run by using wireless networks with their associated security measures....
6 Pages (1500 words) Essay

The Security Mechanism for IEEE 802.11 Wireless Networks

This case study "The security Mechanism for IEEE 802.... 1 Wireless LAN's security mechanisms.... nbsp;They have recently become so popular due to their ability to provide mobility, flexibility and security.... 1 architecture can be used to employ security to the wireless networks.... 1 security mechanisms are the first and most effective and reliable ways to secure wireless networking.... 1 Wireless LAN's security mechanisms....
10 Pages (2500 words) Case Study

Security in Wireless Network

This literature review "security in Wireless Network" presents data security as an ultimate perilous issue in ensuring safe information transmission via the internet.... Issues of network security are currently becoming essential as society is in the movement towards the age of digital information.... hellip; The various issues that occur in wireless communication have a direct association with the security as well as privacy of confidential data....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us