Network PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

WIRELESS NETWORK SECURITY

Abstract:

Wireless network is a network set up by using radio signal frequency to communicate among
computers and other network devices. Sometimes it’s also referred to as WiFi network or
WLAN. This network is getting popular nowadays due to easy to setup feature and no cabling
involved. You can connect computers anywhere in your home without the need for wires.

Introduction:

Wireless networks use radio waves to connect devices such as laptops to the Internet, the
business network and applications. When laptops are connected to Wi-Fi hot spots in public
places, the connection is established to that business’s wireless network.

There are four main types of wireless networks:

• Wireless Local Area Network (LAN): Links two or more devices using a wireless
distribution method, providing a connection through access points to the wider Internet.
• Wireless Metropolitan Area Networks (MAN): Connects several wireless LANs.
• Wireless Wide Area Network (WAN): Covers large areas such as neighboring towns and
cities.
• Wireless Personal Area Network (PAN): Interconnects devices in a short span, generally
within a person’s reach.

Wireless security:

Wireless network security is the process of designing, implementing and ensuring security on a wireless
computer network. It is a subset of network security that adds protection for a wireless computer
network .Wireless network security is also known as wireless security.

TYPES OF WIRELESS ATTACKS:

Wireless Attacks can come at you through different methods. For the most part you need to
worry about WiFi. Some methods rely on tricking users, others use brute force, and some look
for people who don’t bother to secure their network. Many of these attacks are intertwined with
each other in real world use. Here are some of the kinds of attacks you could encount.

I. Packet Sniffing: When information is sent back and forth over a network, it is sent in
what we call packets. Since wireless traffic is sent over the air, it’s very easy to
capture. Quite a lot of traffic (FTP, HTTP, SNMP, ect.) is sent in the clear, meaning
that there is no encryption and files are in plain text for anyone to read. So using a
tool like Wire shark allows you to read data transfers in plain text! This can lead to
stolen passwords or leaks of sensitive information quite easily. Encrypted data can be
captured as well, but it’s obviously much harder for an attacker to decipher the
encrypted data packets.
II. Rouge Access Point: When an unauthorized access point (AP) appears on a network,
it is refereed to as a rouge access point. These can pop up from an employee who
doesn’t know better, or a person with ill intent. These APs represent a vulnerability to
the network because they leave it open to a variety of attacks. These include
vulnerability scans for attack preparation, ARP poisoning, packet captures, and
Denial of Service attacks.

III. Password Theft: When communicating over wireless networks, think of how often
you log into a website. You send passwords out over the network, and if the site
doesn’t use SSL or TLS, that password is sitting in plain text for an attacker to read.
There are even ways to get around those encryption methods to steal the password.
I’ll talk about this with man in the middle attacks.

IV. Man in the Middle Attack: It’s possible for hackers to trick communicating devices
into sending their transmissions to the attacker’s system. Here they can record the
traffic to view later (like in packet sniffing) and even change the contents of files.
Various types of malware can be inserted into these packets, e-mail content could be
changed, or the traffic could be dropped so that communication is blocked.

V. Jamming: There are a number of ways to jam a wireless network. One method is
flooding an AP with de authentication frames. This effectively overwhelms the
network and prevents legitimate transmissions from getting through. This attack is a
little unusual because there probably isn’t anything in it for the hacker. One of the
few examples of how this could benefit someone is through a business jamming their
competitors WiFi signal. This is highly illegal (as are all these attacks), so businesses
would tend to shy away from it. If they got caught they would be facing serious
charges.

Wireless network security Requirements:

In a wireless network, secured services should satisfy certain requirements discussed below .The
wireless communication medium is open to jamming (or interference) and eavesdropping attacks
from intruders. For transmission security (TRANSEC), a robustness function is widely used to
encrypt data at the transmitter for different communication links, such as satellite links and
mobile communication channels. TRANSEC usually provides a relatively weak capability of
combating attacks. The robustness functions may also include low probability of intercept (LPI),
low probability of detection (LPD), low probability of exploitation (LPE), and anti-jamming
protection.

Eavesdropping intruders and traffic analysis:

Eavesdropping is a way for an unintended receiver to intercept a message called an


eavesdropper. A mobile communication session may contain confidential data. Thus, we have to
prevent the eavesdroppers from learning the contents. Encryption is the most commonly used
technique for masking the important contents .Eve might be able to intercept the transmitted
signal but cannot obtain any critical information from it due to the encryption .On the other hand,
traffic analysis can also be used to determine the locations and identities of the communicating
parties by intercepting and examining the transmitted messages. The traffic information may be
useful for tracking the communication patterns of any two parties. Eavesdropping can be
performed even if the messages are encrypted; hence, the malicious users can use the
information gleaned from this type of attack for other forms of attack.

conclusion:

In this paper, we have reviewed recent research in the field of wireless physical layer security,
which exploits the physical properties of radio channels, notably diffusion and superposition, to
provide security in wireless data transmission.And also review Attack on the physical layer that
is voilate the security of physical layer. By using an information theoretic formalism, we have
seen that, in all of the principal channel models of wireless networking, the physical layer can in
principle support reliable data transmission with perfect secrecy under realistic conditions. Note
that a common theme of these results is a reliance on accurate channel modeling. Although this
is a common approach in the design and analysis of communication systems, it nevertheless
means that robustness to the model used is a factor that needs to be considered in practice. We
have discussed this issue in the context of channel state information, but it is in general an
important issue for further research.

References:

[1] Y. Shiu, S. Chang, H. Wu, S. Huang and H. Chen, "Physical layer security in wireless
networks: a tutorial", IEEE Wireless Communications, vol. 18, no. 2, pp. 66-74, 2011. Available:
10.1109/mwc.2011.5751298.

[2] L. Chen, "Security and privacy on physical layer for wireless sensing: A survey", Security
and Privacy, vol. 1, no. 5, p. e22, 2018. Available: 10.1002/spy2.22.

[3] L. Sun and Q. Du, "Physical layer security with its applications in 5G networks: A
review", China Communications, vol. 14, no. 12, pp. 1-14, 2017. Available:
10.1109/cc.2017.8246328.

You might also like