Advance Wireless & Satellite Communication WLAN SECURITY ISSUES Presentation Made By: Syed Junaid Ali Course Instructor: Mr. Muhammad Aamir
Dec 23, 2015
Advance Wireless & Satellite Communication
WLAN SECURITY ISSUES
Presentation Made By:Syed Junaid Ali
Course Instructor: Mr. Muhammad Aamir
a) Wireless Personal Area Networking (WPAN)WPAN describes an application of wireless technology that is intended to address usage scenarios that are inherently personal in nature. The emphasis is on instant connectivity between devices that manage personal data or which facilitate data sharing between small groups of individuals
Types of Wireless Networks:
b) Wireless Local Area Networking (WLAN)WLAN on the other is more focused on organizational connectivity not unlike wire based LAN connections. The intent of WLAN technologies is to provide members of workgroups access to corporate network resources be it shared data, shared applications or e-mail.
Types of Wireless Networks:
c) Wireless Wide Area Network (WWAN)WWAN addresses the need to stay connected while traveling outside thisboundary. Today, cellular technologies enable wireless computer connectivity either via a cable to a cellular telephone or through PC Card cellular modems. The need being addressed by WWAN is the need to stay in touch with business critical communications while traveling.
Types of Wireless Networks:
A wireless LAN (WLAN) is analogous to a wired LAN but radio waves being the transport medium instead of traditional wired structures. This allows the users to move around in a limited area while being still connected to the network. Thus, WLANS combine data connectivity with user mobility, and, through simplified configuration, enable movable LANs.
WLAN OVERVIEW:
WLAN OVERVIEW:
SECURITY OF WLAN NETWORK
IS THE MAIN CONCERN
Security Issues in Wireless Local Area Networks (WLAN) By Dr. Gurjeet Singh
PROBLEMSTATEMENT
RESEARCH OBJECTIVE
RESEARCH METHODOLGY
OPEN ISSUES/AREAS
Before going All-Wireless, organizations should first understand how wireless networks could be vulnerable to several types of intrusion methods.
This paper deals with this wireless local area security technologies and aims to exhibit their potential for integrity, availability and confidentiality. It provides a thorough analysis of the most WLAN packet data services andtechnologies, which can reveal the data in a secure manner.
There were four solutions suggested in response to the WEP vulnerability problems. Among those, IEEE 802.1x (i.e. EAP based) and Cisco LEAP will be treated assimilar solutions for analysis and testing purposes.
WEP based configuration will be implemented in order to emphasize and practically demonstrate the vulnerability in WEP based security. Various test results are discussed and illustrated as followsa) WEP Based Approachb) LEAP Based Approachc) VPN Based Approachd) SSL Based Approach
Not Discussed…..
Wireless LAN: Security Issues and SolutionsBy Rafidah Abdul Hamid
PROBLEMSTATEMENT
RESEARCH OBJECTIVE
RESEARCH METHODOLGY
OPEN ISSUES/AREAS
The paper will then explain how Wired Equivalent Privacy (WEP) works, which is the IEEE 802.11b/WiFi standard encryption for wireless networking. The discussion of WEP continues by examining its weaknesses, which result in it being much less secured than what was originallyintended.
This situation leads to further research regarding practical solutions in implementing a more secured WLAN. This paper will also cover the new standards to improve the security of WLAN such as the IEEE 802.1x standard,which comprises of three separated sections: Point-to-Point Protocol (PPP), Extensible Authentication Protocol (EAP) and 802.1x itself.
One of the standards is 802.1x which was originally designed for wired Ethernet networks. This standard is also part of the 802.11i . The following discussion of 802.1x is divided into three parts, starting with the concept of Point-to-Point Protocol (PPP), followed by Extensible Authentication Protocol (EAP), and continues with the understanding of 802.1x itself.
802.11i, provides replacement technology for WEP security. 802.11i is still in the development and approval processes.
WLAN Security By Sara Nasre
PROBLEMSTATEMENT
RESEARCH OBJECTIVE
RESEARCH METHODOLGY
OPEN ISSUES/AREAS
This paper will provide an overview of the major security risks, threats and vulnerabilities with WLAN systems, referencing 802.11b.
To combat these risks, some protocols and mechanisms needed to secure this wireless LANprotocol.
Common Threats:a) Eavesdroppingb) Unauthorized Accessc) Interference and Jammingd) Physical Threats
Countermeasures:e) Frequency-Hopping Spread
Spectrum ( FHSS )f) Direct-Sequence Spread
Spectrum ( DSSS )g) Infraredh) Narrowbandi) Encryptionj) Authentication
The 802.11i protocol for wireless encryption
Wireless LAN Security Concerns By Albert Van Lengen
PROBLEMSTATEMENT
RESEARCH OBJECTIVE
RESEARCH METHODOLGY
OPEN ISSUES/AREAS
Potential security risks that an enterprise canopen itself to if they do not take appropriate precautions before implementingthis technology.
The purpose of this paper is to assist IT Managers in the decision process when implementing a Wireless Network.
a) Central WEP Key Distribution
b) STA Access Controlc) IP Filtering Firewalld) VPN Tunneling Risk Assessment before
implementing new technologies.
Research Issues in Wireless Networks By Dr. AK Jain
PROBLEMSTATEMENT
RESEARCH OBJECTIVE
RESEARCH METHODOLGY
OPEN ISSUES/AREAS
Problem in managing WLAN services which includes Signal fading, mobility, data rate enhancements, minimizing size and cost, user security and (Quality of service) QoS.
This paper is intended to provide the reader with an overview of the Research Issues and Challenges in wireless networks.
a) Signal Fadingb) Data Ratec) Mobilityd) Power & Energye) Securityf) QoS
Not Addressed
Conclusion
The wireless local area network provides physical flexibility in that it does not matter where within the space the user is working they are still able to use the network.
With a wired network it is necessary to decide where computers will be used and install the ports there. Often the use of space changes with time, and then either the space has to be rewired or long trailing cables are used to get from the computer to the port.
With a wireless network the performance of the network will deteriorate as the usage increases but unless there is very high demand all users will be able to access the network.
The network can reach places that wired networks cannot, this includes out of doors where up to several hundred meters from buildings the signal can be reached. Also, it is relatively easy to set up an access point linked back to the campus network for use in remote premises.
Thank You