Network PDF
Network PDF
Network PDF
Abstract:
Wireless network is a network set up by using radio signal frequency to communicate among
computers and other network devices. Sometimes it’s also referred to as WiFi network or
WLAN. This network is getting popular nowadays due to easy to setup feature and no cabling
involved. You can connect computers anywhere in your home without the need for wires.
Introduction:
Wireless networks use radio waves to connect devices such as laptops to the Internet, the
business network and applications. When laptops are connected to Wi-Fi hot spots in public
places, the connection is established to that business’s wireless network.
• Wireless Local Area Network (LAN): Links two or more devices using a wireless
distribution method, providing a connection through access points to the wider Internet.
• Wireless Metropolitan Area Networks (MAN): Connects several wireless LANs.
• Wireless Wide Area Network (WAN): Covers large areas such as neighboring towns and
cities.
• Wireless Personal Area Network (PAN): Interconnects devices in a short span, generally
within a person’s reach.
Wireless security:
Wireless network security is the process of designing, implementing and ensuring security on a wireless
computer network. It is a subset of network security that adds protection for a wireless computer
network .Wireless network security is also known as wireless security.
Wireless Attacks can come at you through different methods. For the most part you need to
worry about WiFi. Some methods rely on tricking users, others use brute force, and some look
for people who don’t bother to secure their network. Many of these attacks are intertwined with
each other in real world use. Here are some of the kinds of attacks you could encount.
I. Packet Sniffing: When information is sent back and forth over a network, it is sent in
what we call packets. Since wireless traffic is sent over the air, it’s very easy to
capture. Quite a lot of traffic (FTP, HTTP, SNMP, ect.) is sent in the clear, meaning
that there is no encryption and files are in plain text for anyone to read. So using a
tool like Wire shark allows you to read data transfers in plain text! This can lead to
stolen passwords or leaks of sensitive information quite easily. Encrypted data can be
captured as well, but it’s obviously much harder for an attacker to decipher the
encrypted data packets.
II. Rouge Access Point: When an unauthorized access point (AP) appears on a network,
it is refereed to as a rouge access point. These can pop up from an employee who
doesn’t know better, or a person with ill intent. These APs represent a vulnerability to
the network because they leave it open to a variety of attacks. These include
vulnerability scans for attack preparation, ARP poisoning, packet captures, and
Denial of Service attacks.
III. Password Theft: When communicating over wireless networks, think of how often
you log into a website. You send passwords out over the network, and if the site
doesn’t use SSL or TLS, that password is sitting in plain text for an attacker to read.
There are even ways to get around those encryption methods to steal the password.
I’ll talk about this with man in the middle attacks.
IV. Man in the Middle Attack: It’s possible for hackers to trick communicating devices
into sending their transmissions to the attacker’s system. Here they can record the
traffic to view later (like in packet sniffing) and even change the contents of files.
Various types of malware can be inserted into these packets, e-mail content could be
changed, or the traffic could be dropped so that communication is blocked.
V. Jamming: There are a number of ways to jam a wireless network. One method is
flooding an AP with de authentication frames. This effectively overwhelms the
network and prevents legitimate transmissions from getting through. This attack is a
little unusual because there probably isn’t anything in it for the hacker. One of the
few examples of how this could benefit someone is through a business jamming their
competitors WiFi signal. This is highly illegal (as are all these attacks), so businesses
would tend to shy away from it. If they got caught they would be facing serious
charges.
In a wireless network, secured services should satisfy certain requirements discussed below .The
wireless communication medium is open to jamming (or interference) and eavesdropping attacks
from intruders. For transmission security (TRANSEC), a robustness function is widely used to
encrypt data at the transmitter for different communication links, such as satellite links and
mobile communication channels. TRANSEC usually provides a relatively weak capability of
combating attacks. The robustness functions may also include low probability of intercept (LPI),
low probability of detection (LPD), low probability of exploitation (LPE), and anti-jamming
protection.
conclusion:
In this paper, we have reviewed recent research in the field of wireless physical layer security,
which exploits the physical properties of radio channels, notably diffusion and superposition, to
provide security in wireless data transmission.And also review Attack on the physical layer that
is voilate the security of physical layer. By using an information theoretic formalism, we have
seen that, in all of the principal channel models of wireless networking, the physical layer can in
principle support reliable data transmission with perfect secrecy under realistic conditions. Note
that a common theme of these results is a reliance on accurate channel modeling. Although this
is a common approach in the design and analysis of communication systems, it nevertheless
means that robustness to the model used is a factor that needs to be considered in practice. We
have discussed this issue in the context of channel state information, but it is in general an
important issue for further research.
References:
[1] Y. Shiu, S. Chang, H. Wu, S. Huang and H. Chen, "Physical layer security in wireless
networks: a tutorial", IEEE Wireless Communications, vol. 18, no. 2, pp. 66-74, 2011. Available:
10.1109/mwc.2011.5751298.
[2] L. Chen, "Security and privacy on physical layer for wireless sensing: A survey", Security
and Privacy, vol. 1, no. 5, p. e22, 2018. Available: 10.1002/spy2.22.
[3] L. Sun and Q. Du, "Physical layer security with its applications in 5G networks: A
review", China Communications, vol. 14, no. 12, pp. 1-14, 2017. Available:
10.1109/cc.2017.8246328.