Problems identified / experienced by various segments of people include health risk from wireless networks. High power consumption as compared to some other low-bandwidth standards; easily breakable encryption code; ineffective security methods; limited range; neighbouring channel interference, etc. Remedies have been suggested to make this technology user friendly.
Problems identified / experienced by various segments of people include health risk from wireless networks. High power consumption as compared to some other low-bandwidth standards; easily breakable encryption code; ineffective security methods; limited range; neighbouring channel interference, etc. Remedies have been suggested to make this technology user friendly.
Problems identified / experienced by various segments of people include health risk from wireless networks. High power consumption as compared to some other low-bandwidth standards; easily breakable encryption code; ineffective security methods; limited range; neighbouring channel interference, etc. Remedies have been suggested to make this technology user friendly.
Student,4th year, Dept. of E&EC, Punjab Engineering College (DU)
Sector-12,Chandigarh, India, samirdutt.pec@gmail.com
ABSTRACT by wireless transmitters could be contributing
In spite of its great number of advantages, the Wi- to poor concentration and hyperactive Fi technology suffers from many setbacks. In this behaviour among pupils. One school - Stowe paper an attempt has been made to identify the School, in Buckinghamshire - has already various problems related to Wi-Fi technology and dismantled part of its wireless connection suggest remedies thereof. The problems after a teacher fell ill, complaining of identified/experienced by various segments of headaches and nausea. Wireless, or Wi-Fi, people include health risk from wireless networks; systems, uses a small transmitter to link high power consumption as compared to some laptop computers to the Internet without the other low-bandwidth standards; easily breakable use of cables. Installed in up to 80 per cent of encryption code; ineffective security methods; secondary schools in UK and more than half limited range; neighbouring channel interference, of primary schools, they are also used in etc. coffee shops, hotels and airport departure At the end, remedies have been suggested to make lounges, and have become a fixture in this technology user friendly. millions of homes. The system has created a cloud of 'electronic smog' across Britain, scientists say. There are fears that the 1. INTRODUCTION networks could be doing untold damage to Wi-Fi stands for ―Wireless Fidelity‖. It is health. Campaigners claim the level of trademark of the Wi-Fi Alliance (formerly the microwaves emitted by a wireless transmitter Wireless Ethernet Compatibility Alliance), the is comparable to that from a mobile phone trade organization that tests and certifies mast. Problems including headaches and equipment compliance with the 802.11x standards lapses in concentration have already been [1]. It encompasses a worldwide standard, which reported by those who use Wi-Fi systems allows high speed wireless internet transmitted via frequently. Some scientists fear they could radio waves with high speeds. It is a generic term also cause cancer and premature senility. that refers to the IEEE 802.11 communications Children, whose brains and bodies are still standard for Wireless Local Area Networks developing, may be particularly vulnerable. (WLANs) [2]. Wi-Fi Network connects computers Alasdair Philips, of campaign group Power to each other, to the internet and to the wired watch, believes the radiation from wireless network. Basically, it is a LAN that transmits data networks is partly to blame for the rise of through the use of radio devices instead of land- behavioural problems such as attention deficit based wires. Theoretically, Wi-Fi can transmit hyperactivity disorder or ADHD [3]. data at speeds up to 54 Mbytes per second. Actual data transmission speeds vary, depending upon the 2.2 Security Issue speed set by the Wi-Fi provider, the number of If you are utilizing wireless technology on users and the location of a given user [2]. your network then Wi-Fi security should be an issue for you. It is all too easy for a hacker to gain access to a wireless network and cause 2. PROBLEMS ASSOCIATED WITH WI-FI untold damage to both your data and your reputation as a business. The pitfalls are 2.1 Question of health risks numerous, but the benefits of understanding Wireless computer networks in schools may the problems and then ensuring adequate pose a significant health risk to children and security protocols are implemented will far staff. Many teachers fear the radiation emitted outweigh the potential damage caused by a malicious attack. The following points should limits, you could potentially be party to help you to understand the risks involved and illegal usage, such as e-mail spamming or how prevention is a far better solution than downloading illegal software. This could cure. ultimately lead to your ISP ceasing your 2.2.1 Easy Access service. Take any laptop or desktop computer with a 2.2.4 Physical Security wireless card attached and try looking for There are strong comparisons in the wireless devices within range. If you are in development of wireless security to the a busy residential or office area, you are challenges experienced in implementing almost certain to see a number of wireless mobile phone technology. This also networks in operation. This isn‘t necessarily advanced in several stages and standards, a bad thing, as these devices need to from the initial analogue, through to digital, broadcast their presence periodically to GSM and 3G technology. In fact, the main allow valid users to link up and use their threat posed to wireless users is not from services. However, the information needed attacks on your network from sophisticated to join a network is also the information hackers, but actually the likelihood of used to launch an attack on a network. someone breaking into your car and stealing 2.2.2 Rogue Access Points your wireless enabled laptop or PDA, It is now far too easy for an area of your complete with your passwords and network to be turned into a wireless LAN encryption details. Rather than try and by non-IT staff who does not understand break down security codes, it is often easier the risks they are taking by potentially for a potential hacker to simply steal a opening up your network to all and sundry. device that will give them direct access to The cost and easy availability of wireless the network. This has led to access point‘s means that a junior manager telecommunication companies investing can easily sign off the expenditure and run heavily in creating unique ID‘s on every down to his local computer shop and set up mobile phone and SIM card to deter his own wireless network. physical theft. Wireless technology is no As you can imagine, this is becoming an different, although the security techniques increasing headache for network are less advanced. Therefore physical administrators, as end users are often security has become the main concern and unaware of the great security risks they are the need to keep laptops and other wireless taking. Users rarely bother to change the devices locked away from potential thieves default settings of their wireless access has become the issue of the day. points and therefore non-IT staff in large 2.2.5 Eavesdropping organizations is unlikely to do much better. The 802.11 standard does not provide any 2.2.3 Unauthorized Use Of Service protection for attacks on the passive It‘s a fact that most access points are monitoring of data in transit – in other installed with only minimal changes to their words, eavesdropping. Anyone with a default settings. Encryption standards such wireless network analyzer can monitor as WEP (Wired Equivalent Privacy) are packets of data as they are transmitted. rarely activated, or if they have, then only Flaws in WEP encryption did not fully the default key has been used on all the address the security of wireless networks, vendor‘s products. Any wireless network resulting in a number of options open to an which does not have secure encryption and attacker who might want to disrupt access controls is usually there for the transmissions by transmitting spoof frames taking. If your network is breached, there of data. are serious implications which should be 2.2.6 Spoofing And Session Hijacking considered. Although your actual data may Traditional Ethernet wired networks and not have been compromised or destroyed, 802.11 wireless networks provide no your bandwidth may have been used to protection against forgery of frame source upload and download data from external addresses. In other words, data can be sources. As well as incurring additional spoofed to appear to be sent within your charges for exceeding your bandwidth network. Spoofed frames can be used to redirect and corrupt data. MAC addresses of the limited resources available. There are a wireless stations can also be observed and number of ways which can result in wireless these addresses adopted for malicious traffic becoming overwhelmed, such as traffic transmissions. coming from the wired network transmitting Spoofed frames can also be employed by at a higher rate then the radio channel can attackers in active attacks, allowing access handle. It is possible for an attack to come points to be exploited if there is a lack of from somebody not even attached to your authentication. Access points identify wireless access point, but by simply themselves on a network by the broadcast broadcasting on the same space and radio of beacon frames. If a station broadcasts the channel. Even if there is no malicious attempt correct indent (SSID), it will appear to be to attack your network, large movement of part of the authorized network. It is files across your network can also bring your therefore possible for an attacker to appear infrastructure to a grinding halt [4]. as a genuine access point on the network, as nothing in the 802.11 standard requires an 2.4 Traffic Analysis And Interference access point to prove it really is one. This Many 2.4 GHz 802.11b and 802.11g Access could potentially lead to an attacker points default to the same channel on initial discovering network credentials to gain full startup, contributing to congestion on certain access to the network [4]. channels. Wi-Fi pollution, or an excessive 2.2.7 Higher Level Attacks number of access points in the area, especially A successful attack on your wireless on the same or neighboring channel, can network can serve as a launch pad for prevent access and interfere with the use of attacks on other systems within your IT other access points by others, caused by infrastructure. Once you‘re in, it‘s unlikely overlapping channels in the spectrum, as well there will be sufficient internal controls to as with decreased signal-to-noise ratio (SNR) prevent access to all areas of your data. It‘s between access points. This can be a problem quick and easy to deploy wireless LAN‘s, in high-density areas, such as large apartment but it‘s also all too easy to therefore expose complexes or office buildings with many Wi- your network to attack. Other networks Fi access points. Additionally, other devices could then also be compromised if there is use the 2.4 GHz band: microwave ovens, insufficient security in place. Ultimately, security cameras, Bluetooth devices and your own network could be used to attack amateur radio, video senders, cordless phones networks across the world, which wouldn‘t and baby monitors can cause significant win your business any awards in the additional interference. popularity stakes. 2.5 High Power Consumption 2.3 Service And Performance Constraints Power-hungry Wi-Fi adapters can take a big Current wireless LAN technologies are bite out of battery life, especially for smaller limited in the speed at which they transmit portable devices such as PDAs. Power data. The most common standards at present consumption is fairly high compared to some are 802.11b (which transmits at 11 Mbps) and other low-bandwidth standards, such as the newer 802.11g (which transmits at 54 Zigbee and Bluetooth, making battery life a Mbps). These standards are being developed concern in case of Wi-Fi. all the time and there are already enhanced versions available running at much higher 2.6 Limited Range speeds than these. The transmission speed is Wi-Fi networks have limited range. A typical shared between all the users associated with Wi-Fi home router using 802.11b or 802.11g an access point and in real terms the effective with a stock antenna might have a range of 32 throughput is only around half of the nominal m (120 ft) indoors and 95 m (300 ft) outdoors. bit rate. This means that a build up of traffic Range also varies with frequency band. Wi-Fi through use of local applications could have a in the 2.4 GHz frequency block has slightly dramatic effect on the operation of the better range than Wi-Fi in the 5 GHz network and that an attack on the network frequency block. Outdoor range with could well result in a denial of service due to improved (directional) antennas can be several kilometers or more with line-of-sight authentication. If you have deployed a VPN [5]. to protect the network from wireless clients, it probably has built-in authentication already. Of course, if your business requires 3. REMEDIES TO MAKE WIFI PROBLEMS the need to provide wireless ‗hot spots‘ FREE such as in hotels and airports, the security techniques employed need to be radically 3.1 The entire expert reviews done all over the different. In these circumstances, world indicate that there is unlikely to be a authentication is often carried out via a web health risk from wireless networks. When browser and does not require specialized conducted measurements in schools, typical client software in order to gain access. exposures from Wi-Fi were around 20 3.2.5 To prevent spoofing, technology is being millionths of the international guideline levels developed to authenticate valid users of of exposure to radiation. As a comparison, a wireless networks. Without the correct child on a mobile phone receives up to 50 authentication, potential attackers are percent of guideline levels. So a year sitting in denied access from the network, although a classroom near a wireless network is this doesn‘t fully prevent access to the radio roughly equivalent to 20 minutes on a mobile. layer and denial of service attacks. If Wi-Fi should be taken out of schools, then The standard for user authentication was the mobile phone network should be shut first ratified in 2001. Currently, down, too—and FM radio and TV, as the authentication can be used to validate a user strength of their signals is similar to that from before accessing the network. However Wi-Fi in classrooms [3]. additional features are currently being developed and are likely to be adopted as 3.2 Unless you are prepared to heavily shield the part of the 802.11i standard. walls of your office or home to prevent Further developments in 802.1x will ensure signals escaping, there is no solution to the that mutual authentication is supported. problem of security breach. In order to Access point will need to validate their minimize the risk of such an attack, you identity before gaining access to the should ensure you implement the strongest network and strong cryptography will be access controls and encryption solutions employed to maintain security over the available to you. This will stop your wireless airwaves. Until frame authentication is fully network from being used as an easy entry utilized by 802.11, session hijacking will point into your network and ultimately into remain a problem. Until such time, your data. additional cryptographic protocols will need 3.2.1 Ensure firewalls are correctly deployed and to be employed on top of wireless networks. use VPN‘s to manage sensitive connections. 3.2.6 A number of cracking tools, such as 3.2.2 Wi-Fi Protected Access (WPA and WPA2) AirSnort and WEPCrack make some WEP aims to solve the problem of hacking. It has encryption easy to break, although the latest great security advantage over the WEP and software and firmware updates available is now available on most products. To turn from the vendors have eliminated these security on requires the user to configure attacks. The latest products have helped the device, usually via a software graphical increase security and can even self-generate user interface (GUI). WEP encryption keys at regular intervals, to 3.2.3 Network administrators can use tools such foil even the most persistent attacks. Whilst as Net Stumbler as they wander around vendors try and stay one step ahead of the their building attempting to discover rogue attackers, how you protect your wireless access points. networks is largely a question of risk 3.2.4 How secure your wireless network needs to management. WEP may be insufficient if be depends heavily on the type of business your wireless LAN is being used for and network you are running. In a typical sensitive data and there may be a office environment, utilizing mainly a wired requirement for stronger cryptographic network, access to wireless access points solutions such as SSH, SSL or IPSec. These needs to be strictly controlled with strong technologies were designed to allow the transmission of data via public channels and them in the clearest and least obstructed spots are proven to give higher levels of security. you can find. The next thing to consider is antennas. Most 3.3 There are now a number of devices on the routers and notebook wireless adapters come market that can monitor and report on the with small, low-efficiency antennas. You can performance of wireless networks. Whilst significantly improve your wireless network's these devices do not help in defending your range by upgrading to directional antennas at network from attacks, they do alert you to any both ends of the wireless connection. Put the such problems and also of possible heavy router as close as possible to the directional users within your organization that may be antenna to minimize signal loss. monopolizing the bandwidth.
3.4 To remove the problem of initial startup 4. CONCLUSION
congestion, the users can change the channel The whole process of wireless LAN may appear of operation of access points by configuring challenging. However, despite the pitfalls the device. described here, it is still possible to successfully address these issues by implementing reasonable 3.5 The Power consumption can be reduced by precautions. Whilst network technologies are use of new technology routers and adapter constantly developing and hacking techniques are chips. Though initially costly, these can becoming increasingly sophisticated, it is possible decrease energy costs by reducing power to keep on top of your security. consumption without sacrificing performance. The next generation of Wireless LAN‘s is already These include D-Link‘s Green Ethernet(TM) being driven by mobility, allowing users to move technology, Texas Instruments‘ new Wi-Fi seamlessly across a network with their mobile chip, the TNETW1100B, which is said to device, without any interruption or loss of consume a tenth or less of the standby power connection. However, technology hasn‘t yet fully of competing chips and many other new embraced the facility for users to roam from one products. network segment to another. Developments in these areas are however sure to be just around the 3.6 The most important thing to remember is that corner, providing even greater challenges for the the RF radio signals that power wireless data network managers who have to make sense of it networks work best when there's an actual all. line of sight from the transmitter (the router or access point) to the receiver (your laptop). In any real office that line of sight will be 5. REFERENCES interrupted by walls, floors, bundles of cables, [1] ‗Wi-Fi‘ on www.wikipedia.org. lighting installations, mainframe computers, [2] ‗Wi-Fi Alliance‘ on www.wi-fi.org. telephone closets, file cabinets, lunchrooms [3] Fiona Macrae, ―Wi-Fi internet poses a health full of pesky microwaves that interfere with risk for children‖, Daily Mail (Health the signal and all manners of other junk -- but Section), 22 April 2007, UK. you can still optimize the line of sight by [4] www.wifieducationbureau.org. placing the router and the access points as [5] ‗Wi-Fi‘ on www.dailywireless.com high as you can above the floor and locating .