You are on page 1of 4

Research Paper Based Assignment

Submitted By : Gurjot Singh


Reg. No. : 1627313
Author: Min-kyu Choi, Rosslin John Robles, Chang-hwa Hong, Tai-hoon Kim
Title : Wireless Network Security
Source : International Journal of Multimedia and Ubiquitous Engineering
Accessed : Vol 3, No. 3 , July 2008
Published by : School of Multimedia, Hannam University, Daejeon, Korea
Email Contact : puremiroa@naver.com, rosslin_john@yahoo.com, taihoonn@hannam.ac.kr

Introduction
At the first instance, the paper exhibits the productivity advantage of the Wireless networking
which has increased accessibility to information resources. It lays that Network configuration
and reconfiguration is easier, faster and less expensive. But it also lays that wireless network
creates new threats and security risk.. The majority of computers sold to consumers today come
pre-equipped with all necessary wireless networks technology. Wireless Networks present a host
of issues for network managers. But there are few advantages and disadvantages of wireless
network technology. The positives includes Mobility, Convenience, Productivity, Deployment,
Cost and Expandability while replete with the conveniences and advantages described above has
its share of downfalls. The disadvantages of using wireless network includes Security, Range,
Reliability and Speed.

Purpose of the Research


The objective of this paper is to assist managers in making decisions related to wireless network
security by providing them a basic understanding of the nature of various threats associated with
wireless networking and available countermeasures.

FINDINGS
The paper also lays the Wireless Vulnerabilities, Threats and Countermeasures which are
structured of basic of four components: The transmission of data using radio frequencies;
Access points that provide a connection to the organizational network and Client devices
and Users.
It also gives information about various Wireless Network Attacks which includes :
Accidental association
Malicious association
Ad-hoc networks
Non- traditional networks
Identity theft (MAC spoofing)
Man in the middle attacks
Denial of service
Network injection
Caffe Latter attack
Also, it lays Security Wireless Transmissions where three major threats includes:
Interception, Alteration and Disruption.
The paper also give information about protecting the confidentiality of Wireless
Transmissions where in two types of countermeasures methods exists which includes:
Signal Hiding Techniques
Encryption
Securing wireless transmissions can also be done through prevention alteration of
intercepted communications. Two types of countermeasures can significantly reduce the
risk of attacks: strong encryption and strong authentication of both devices and users.
Insecure, poorly configured wireless access points can compromise confidentiality by
allowing unauthorized access to the network.
Various countermeasures are given in the paper for securing the wireless access points
which can help in reducing risk of unauthorized access to wireless networks.
Two major threats to wireless client devices are given in prospects, one being Loss or
theft and second being compromise.
For Securing Wireless Networks various effective way are lay upon from intruders is to
encrypt or scramble, communications over network. Use of Encryption as well as Use of
anti-virus and anti spyware software and a firewall will help in securing the network.

Not only this but also turning off identifier broadcasting, changing the identifier on
router from default, changing routers pre-set password and allowing only specific
computers to access network can improve the security of networks.
Users are the key component to wireless network security, training and educating them
will help in more efficient work/
Even Wireless network auditing is an important part of WLAN security policy that help
regularly in auditing for rouge hardware.
Conclusion
There are numerous of advantages and disadvantages of Wireless network security although it is
impossible to totally eliminate all risks associated with it, but it is possible to achieve reasonable
level of overall security by adopting a systematic approach in assessing and managing the risk
associated with wireless network. This paper also discussed the threats and vulnerabilities
associated with each of the three basic technology components of wireless networks i.e clients,
access points and transmission medium and described commonly available countermeasures that
could be used to mitigate risks
Evaluation
Though Wireless network provides number of opportunities in connecting people which
adds to increase in productivity, it also alters upon the security risk profile of the
organization.
Training and educating users will also help in securing this wireless network. To be
effective , user training and education needs to be repeated periodically.
Specialized tools can be taken up for auditing the networks which can be used for
cracking loopholes in the network.
Securing wireless networks can be effectively secured by using various antiviruses and
spyware and controller methods.
Fundamental security objectives should be confidentiality, integrity and availability
References
[1] Graham, E., Steinbart, P.J. (2006) Wireless Security
[2] Cisco. (2004). Dictionary attack on Cisco LEAP vulnerability, Revision 2.1, July 19.
[3] CSI. (2004). CSI/FBI Computer Crime and Security Survey.
[4] Hopper, D. I.(2002). Secret Service agents probe wireless networks in Washington.

[5] Kelley, D. (2003). The X factor: 802.1x may be just what you need to stop intruders from
accessing your network. Information Security, 6(8), 60-69.
[6] Kennedy, S. (2004). Best practices for wireless network security. Information Systems
Control Journal (3).
[7] McDougall, P. (2004, March 25). Laptop theft puts GMAC customersdata at risk.
Information Week Security Pipeline.
[8] Nokia. (2003). Man-in-the-middle attacks in tunneled authentication protocols.
[9] Paladugu, V., Cherukuru, N., & Pandula, S. (2001). Comparison of security protocols for
wireless communications.
[10] Slashdot. (2002, August 18). Wardriving from 1500ft Up.
[11] Stoneburner, G., Goguen, A., & Feringa, A. (2002, July). Risk management guide for
information technology systems. NIST Special Publication 800-30. [12] Wailgum, T. (2004,
September 15). Living in wireless denial. CIO Magazine.

You might also like