You are on page 1of 5

WI-FI TECHNOLOGY- PROBLEMS AND REMEDIES

Samir Dutt

Student,4th year, Dept. of E&EC, Punjab Engineering College (DU)


Sector-12,Chandigarh, India, samirdutt.pec@gmail.com

ABSTRACT by wireless transmitters could be contributing


In spite of its great number of advantages, the Wi- to poor concentration and hyperactive
Fi technology suffers from many setbacks. In this behaviour among pupils. One school - Stowe
paper an attempt has been made to identify the School, in Buckinghamshire - has already
various problems related to Wi-Fi technology and dismantled part of its wireless connection
suggest remedies thereof. The problems after a teacher fell ill, complaining of
identified/experienced by various segments of headaches and nausea. Wireless, or Wi-Fi,
people include health risk from wireless networks; systems, uses a small transmitter to link
high power consumption as compared to some laptop computers to the Internet without the
other low-bandwidth standards; easily breakable use of cables. Installed in up to 80 per cent of
encryption code; ineffective security methods; secondary schools in UK and more than half
limited range; neighbouring channel interference, of primary schools, they are also used in
etc. coffee shops, hotels and airport departure
At the end, remedies have been suggested to make lounges, and have become a fixture in
this technology user friendly. millions of homes. The system has created a
cloud of 'electronic smog' across Britain,
scientists say. There are fears that the
1. INTRODUCTION networks could be doing untold damage to
Wi-Fi stands for ―Wireless Fidelity‖. It is health. Campaigners claim the level of
trademark of the Wi-Fi Alliance (formerly the microwaves emitted by a wireless transmitter
Wireless Ethernet Compatibility Alliance), the is comparable to that from a mobile phone
trade organization that tests and certifies mast. Problems including headaches and
equipment compliance with the 802.11x standards lapses in concentration have already been
[1]. It encompasses a worldwide standard, which reported by those who use Wi-Fi systems
allows high speed wireless internet transmitted via frequently. Some scientists fear they could
radio waves with high speeds. It is a generic term also cause cancer and premature senility.
that refers to the IEEE 802.11 communications Children, whose brains and bodies are still
standard for Wireless Local Area Networks developing, may be particularly vulnerable.
(WLANs) [2]. Wi-Fi Network connects computers Alasdair Philips, of campaign group Power
to each other, to the internet and to the wired watch, believes the radiation from wireless
network. Basically, it is a LAN that transmits data networks is partly to blame for the rise of
through the use of radio devices instead of land- behavioural problems such as attention deficit
based wires. Theoretically, Wi-Fi can transmit hyperactivity disorder or ADHD [3].
data at speeds up to 54 Mbytes per second. Actual
data transmission speeds vary, depending upon the 2.2 Security Issue
speed set by the Wi-Fi provider, the number of If you are utilizing wireless technology on
users and the location of a given user [2]. your network then Wi-Fi security should be
an issue for you. It is all too easy for a hacker
to gain access to a wireless network and cause
2. PROBLEMS ASSOCIATED WITH WI-FI untold damage to both your data and your
reputation as a business. The pitfalls are
2.1 Question of health risks numerous, but the benefits of understanding
Wireless computer networks in schools may the problems and then ensuring adequate
pose a significant health risk to children and security protocols are implemented will far
staff. Many teachers fear the radiation emitted outweigh the potential damage caused by a
malicious attack. The following points should limits, you could potentially be party to
help you to understand the risks involved and illegal usage, such as e-mail spamming or
how prevention is a far better solution than downloading illegal software. This could
cure. ultimately lead to your ISP ceasing your
2.2.1 Easy Access service.
Take any laptop or desktop computer with a 2.2.4 Physical Security
wireless card attached and try looking for There are strong comparisons in the
wireless devices within range. If you are in development of wireless security to the
a busy residential or office area, you are challenges experienced in implementing
almost certain to see a number of wireless mobile phone technology. This also
networks in operation. This isn‘t necessarily advanced in several stages and standards,
a bad thing, as these devices need to from the initial analogue, through to digital,
broadcast their presence periodically to GSM and 3G technology. In fact, the main
allow valid users to link up and use their threat posed to wireless users is not from
services. However, the information needed attacks on your network from sophisticated
to join a network is also the information hackers, but actually the likelihood of
used to launch an attack on a network. someone breaking into your car and stealing
2.2.2 Rogue Access Points your wireless enabled laptop or PDA,
It is now far too easy for an area of your complete with your passwords and
network to be turned into a wireless LAN encryption details. Rather than try and
by non-IT staff who does not understand break down security codes, it is often easier
the risks they are taking by potentially for a potential hacker to simply steal a
opening up your network to all and sundry. device that will give them direct access to
The cost and easy availability of wireless the network. This has led to
access point‘s means that a junior manager telecommunication companies investing
can easily sign off the expenditure and run heavily in creating unique ID‘s on every
down to his local computer shop and set up mobile phone and SIM card to deter
his own wireless network. physical theft. Wireless technology is no
As you can imagine, this is becoming an different, although the security techniques
increasing headache for network are less advanced. Therefore physical
administrators, as end users are often security has become the main concern and
unaware of the great security risks they are the need to keep laptops and other wireless
taking. Users rarely bother to change the devices locked away from potential thieves
default settings of their wireless access has become the issue of the day.
points and therefore non-IT staff in large 2.2.5 Eavesdropping
organizations is unlikely to do much better. The 802.11 standard does not provide any
2.2.3 Unauthorized Use Of Service protection for attacks on the passive
It‘s a fact that most access points are monitoring of data in transit – in other
installed with only minimal changes to their words, eavesdropping. Anyone with a
default settings. Encryption standards such wireless network analyzer can monitor
as WEP (Wired Equivalent Privacy) are packets of data as they are transmitted.
rarely activated, or if they have, then only Flaws in WEP encryption did not fully
the default key has been used on all the address the security of wireless networks,
vendor‘s products. Any wireless network resulting in a number of options open to an
which does not have secure encryption and attacker who might want to disrupt
access controls is usually there for the transmissions by transmitting spoof frames
taking. If your network is breached, there of data.
are serious implications which should be 2.2.6 Spoofing And Session Hijacking
considered. Although your actual data may Traditional Ethernet wired networks and
not have been compromised or destroyed, 802.11 wireless networks provide no
your bandwidth may have been used to protection against forgery of frame source
upload and download data from external addresses. In other words, data can be
sources. As well as incurring additional spoofed to appear to be sent within your
charges for exceeding your bandwidth network. Spoofed frames can be used to
redirect and corrupt data. MAC addresses of the limited resources available. There are a
wireless stations can also be observed and number of ways which can result in wireless
these addresses adopted for malicious traffic becoming overwhelmed, such as traffic
transmissions. coming from the wired network transmitting
Spoofed frames can also be employed by at a higher rate then the radio channel can
attackers in active attacks, allowing access handle. It is possible for an attack to come
points to be exploited if there is a lack of from somebody not even attached to your
authentication. Access points identify wireless access point, but by simply
themselves on a network by the broadcast broadcasting on the same space and radio
of beacon frames. If a station broadcasts the channel. Even if there is no malicious attempt
correct indent (SSID), it will appear to be to attack your network, large movement of
part of the authorized network. It is files across your network can also bring your
therefore possible for an attacker to appear infrastructure to a grinding halt [4].
as a genuine access point on the network, as
nothing in the 802.11 standard requires an 2.4 Traffic Analysis And Interference
access point to prove it really is one. This Many 2.4 GHz 802.11b and 802.11g Access
could potentially lead to an attacker points default to the same channel on initial
discovering network credentials to gain full startup, contributing to congestion on certain
access to the network [4]. channels. Wi-Fi pollution, or an excessive
2.2.7 Higher Level Attacks number of access points in the area, especially
A successful attack on your wireless on the same or neighboring channel, can
network can serve as a launch pad for prevent access and interfere with the use of
attacks on other systems within your IT other access points by others, caused by
infrastructure. Once you‘re in, it‘s unlikely overlapping channels in the spectrum, as well
there will be sufficient internal controls to as with decreased signal-to-noise ratio (SNR)
prevent access to all areas of your data. It‘s between access points. This can be a problem
quick and easy to deploy wireless LAN‘s, in high-density areas, such as large apartment
but it‘s also all too easy to therefore expose complexes or office buildings with many Wi-
your network to attack. Other networks Fi access points. Additionally, other devices
could then also be compromised if there is use the 2.4 GHz band: microwave ovens,
insufficient security in place. Ultimately, security cameras, Bluetooth devices and
your own network could be used to attack amateur radio, video senders, cordless phones
networks across the world, which wouldn‘t and baby monitors can cause significant
win your business any awards in the additional interference.
popularity stakes.
2.5 High Power Consumption
2.3 Service And Performance Constraints Power-hungry Wi-Fi adapters can take a big
Current wireless LAN technologies are bite out of battery life, especially for smaller
limited in the speed at which they transmit portable devices such as PDAs. Power
data. The most common standards at present consumption is fairly high compared to some
are 802.11b (which transmits at 11 Mbps) and other low-bandwidth standards, such as
the newer 802.11g (which transmits at 54 Zigbee and Bluetooth, making battery life a
Mbps). These standards are being developed concern in case of Wi-Fi.
all the time and there are already enhanced
versions available running at much higher 2.6 Limited Range
speeds than these. The transmission speed is Wi-Fi networks have limited range. A typical
shared between all the users associated with Wi-Fi home router using 802.11b or 802.11g
an access point and in real terms the effective with a stock antenna might have a range of 32
throughput is only around half of the nominal m (120 ft) indoors and 95 m (300 ft) outdoors.
bit rate. This means that a build up of traffic Range also varies with frequency band. Wi-Fi
through use of local applications could have a in the 2.4 GHz frequency block has slightly
dramatic effect on the operation of the better range than Wi-Fi in the 5 GHz
network and that an attack on the network frequency block. Outdoor range with
could well result in a denial of service due to improved (directional) antennas can be
several kilometers or more with line-of-sight authentication. If you have deployed a VPN
[5]. to protect the network from wireless clients,
it probably has built-in authentication
already. Of course, if your business requires
3. REMEDIES TO MAKE WIFI PROBLEMS the need to provide wireless ‗hot spots‘
FREE such as in hotels and airports, the security
techniques employed need to be radically
3.1 The entire expert reviews done all over the different. In these circumstances,
world indicate that there is unlikely to be a authentication is often carried out via a web
health risk from wireless networks. When browser and does not require specialized
conducted measurements in schools, typical client software in order to gain access.
exposures from Wi-Fi were around 20 3.2.5 To prevent spoofing, technology is being
millionths of the international guideline levels developed to authenticate valid users of
of exposure to radiation. As a comparison, a wireless networks. Without the correct
child on a mobile phone receives up to 50 authentication, potential attackers are
percent of guideline levels. So a year sitting in denied access from the network, although
a classroom near a wireless network is this doesn‘t fully prevent access to the radio
roughly equivalent to 20 minutes on a mobile. layer and denial of service attacks.
If Wi-Fi should be taken out of schools, then The standard for user authentication was
the mobile phone network should be shut first ratified in 2001. Currently,
down, too—and FM radio and TV, as the authentication can be used to validate a user
strength of their signals is similar to that from before accessing the network. However
Wi-Fi in classrooms [3]. additional features are currently being
developed and are likely to be adopted as
3.2 Unless you are prepared to heavily shield the part of the 802.11i standard.
walls of your office or home to prevent Further developments in 802.1x will ensure
signals escaping, there is no solution to the that mutual authentication is supported.
problem of security breach. In order to Access point will need to validate their
minimize the risk of such an attack, you identity before gaining access to the
should ensure you implement the strongest network and strong cryptography will be
access controls and encryption solutions employed to maintain security over the
available to you. This will stop your wireless airwaves. Until frame authentication is fully
network from being used as an easy entry utilized by 802.11, session hijacking will
point into your network and ultimately into remain a problem. Until such time,
your data. additional cryptographic protocols will need
3.2.1 Ensure firewalls are correctly deployed and to be employed on top of wireless networks.
use VPN‘s to manage sensitive connections. 3.2.6 A number of cracking tools, such as
3.2.2 Wi-Fi Protected Access (WPA and WPA2) AirSnort and WEPCrack make some WEP
aims to solve the problem of hacking. It has encryption easy to break, although the latest
great security advantage over the WEP and software and firmware updates available
is now available on most products. To turn from the vendors have eliminated these
security on requires the user to configure attacks. The latest products have helped
the device, usually via a software graphical increase security and can even self-generate
user interface (GUI). WEP encryption keys at regular intervals, to
3.2.3 Network administrators can use tools such foil even the most persistent attacks. Whilst
as Net Stumbler as they wander around vendors try and stay one step ahead of the
their building attempting to discover rogue attackers, how you protect your wireless
access points. networks is largely a question of risk
3.2.4 How secure your wireless network needs to management. WEP may be insufficient if
be depends heavily on the type of business your wireless LAN is being used for
and network you are running. In a typical sensitive data and there may be a
office environment, utilizing mainly a wired requirement for stronger cryptographic
network, access to wireless access points solutions such as SSH, SSL or IPSec. These
needs to be strictly controlled with strong technologies were designed to allow the
transmission of data via public channels and them in the clearest and least obstructed spots
are proven to give higher levels of security. you can find.
The next thing to consider is antennas. Most
3.3 There are now a number of devices on the routers and notebook wireless adapters come
market that can monitor and report on the with small, low-efficiency antennas. You can
performance of wireless networks. Whilst significantly improve your wireless network's
these devices do not help in defending your range by upgrading to directional antennas at
network from attacks, they do alert you to any both ends of the wireless connection. Put the
such problems and also of possible heavy router as close as possible to the directional
users within your organization that may be antenna to minimize signal loss.
monopolizing the bandwidth.

3.4 To remove the problem of initial startup 4. CONCLUSION


congestion, the users can change the channel The whole process of wireless LAN may appear
of operation of access points by configuring challenging. However, despite the pitfalls
the device. described here, it is still possible to successfully
address these issues by implementing reasonable
3.5 The Power consumption can be reduced by precautions. Whilst network technologies are
use of new technology routers and adapter constantly developing and hacking techniques are
chips. Though initially costly, these can becoming increasingly sophisticated, it is possible
decrease energy costs by reducing power to keep on top of your security.
consumption without sacrificing performance. The next generation of Wireless LAN‘s is already
These include D-Link‘s Green Ethernet(TM) being driven by mobility, allowing users to move
technology, Texas Instruments‘ new Wi-Fi seamlessly across a network with their mobile
chip, the TNETW1100B, which is said to device, without any interruption or loss of
consume a tenth or less of the standby power connection. However, technology hasn‘t yet fully
of competing chips and many other new embraced the facility for users to roam from one
products. network segment to another. Developments in
these areas are however sure to be just around the
3.6 The most important thing to remember is that corner, providing even greater challenges for the
the RF radio signals that power wireless data network managers who have to make sense of it
networks work best when there's an actual all.
line of sight from the transmitter (the router or
access point) to the receiver (your laptop). In
any real office that line of sight will be 5. REFERENCES
interrupted by walls, floors, bundles of cables, [1] ‗Wi-Fi‘ on www.wikipedia.org.
lighting installations, mainframe computers, [2] ‗Wi-Fi Alliance‘ on www.wi-fi.org.
telephone closets, file cabinets, lunchrooms [3] Fiona Macrae, ―Wi-Fi internet poses a health
full of pesky microwaves that interfere with risk for children‖, Daily Mail (Health
the signal and all manners of other junk -- but Section), 22 April 2007, UK.
you can still optimize the line of sight by [4] www.wifieducationbureau.org.
placing the router and the access points as [5] ‗Wi-Fi‘ on www.dailywireless.com
high as you can above the floor and locating
.

You might also like