Preview

Implementation of Security for Wireless Network

Powerful Essays
Open Document
Open Document
3544 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Implementation of Security for Wireless Network
Implementation of Security for Wireless Network
R.Sridevi (Asst.Prof)
Department of Computer Science
PSG College of Arts & Science
Coimbatore, TN. srinashok@gmail.com Abstract -This paper addresses the internal and the external security challenges in organizations that implements wireless networks. Distributed security is designed to provide a more secure data communication among faculty members, staff and students. A description of the technique used to protect and keep PC 's up and running is illustrated with applications.

Keywords: Access point, LAN.

1. INTRODUCTION The market for wireless communications has experienced incredible growth over recent years and wireless LANs have rapidly become a very important network architecture offering benefits of increased flexibility and mobility. Unlike a traditional wired LAN, users can access servers with much greater freedom. Mobility in IP architecture as well as mobility between wireless LANs and wireless WANs enhances these benefits even further. Such benefits of mobility and access come with significant security and performance requirements. The importance of maintaining secure and reliable connections between 'the communicating parties is often underestimated or even ignored. Security risks in wireless networks are equal to the sum of the risk of operating a wired network plus the new risks introduced as a result of the portability of wireless devices [I]. To reduce these risks, organizations need to adopt security measures and practices, which lower such risks to a manageable level. WLANs do not replace wired solutions but complement them. It provides network connectivity in difficult wiring areas and allows mobile users to work with Traditional wired applications with high throughput for both indoor and outdoor environments. Although WLANs came into the market almost a decade ago, standardized WLANs have been available since the late 1990s when IEEE 802.11 was born. There



References: [1]Karygiannis, T., and Owens, L., (2002). Drof: Wireless Nerwork Securir) ' -802.11, Bluetooth and Hond held Devices. USA. National Institute of Standards and cchnalagy [2]Hunt, R., Vargo, J., Wang, J., Impact of Security Architectures on Wireless Network Performance, 51h IEEE International Conference an Mobile and Wireless Communications Networks (MWCN 2003), Pages 331-334, Singapore 27-29 October, 2003 [3]Lewis Z. Kock, "Outsourcing Security", ZDNet Interactive week, 2000. .t. Markbam T. & Payne C. "Security at the network Edge: A Distributed Firewall Architecture", IEEE-CNF, 2001. [4]S. Harris, "ALL IN ONE CISSP Certification ", McGraw / Osborne, 2002. [5]. 2278- 6643) | Volume-1 Issue-3, December 2012 IJRREST: International Journal of Research Review in Engineering Science and Technology (ISSN Subhash Kumar, Arun Kumar Rathode, Rajesh Singh M.Tech. Scholar, Bhagwant University, Ajmer, Rajasthan, India

You May Also Find These Documents Helpful

  • Better Essays

    Week 3 iLab Report

    • 1123 Words
    • 4 Pages

    Ciampa, M. (2013). WNA Guide to Wireless LAN’s (3rd ed.). [VitalSource Bookshelf]. Retrieved from http://www.devryu.net/…

    • 1123 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Upgrading to an optimized WLAN architecture, using 802.11n technology, provides Highbrow Ed with a scalable, efficient, high-performing wireless network. An optimized WLAN architecture combines the advantages of central management and addresses the limitations of having a central wireless switch. Optimized WLAN consists of intelligent Access Points (Aps) and a WLAN controller. The APs forward traffic and enforce security and prioritization policies, while the WLAN controller centrally manages and controls all APs. The APs dispatch all traffic directly from source to destination without requiring a detour to the controller.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Activity 1

    • 667 Words
    • 3 Pages

    Although the freedom to roam the facility and always be connected to the LAN can be a great advantage for network users, the amount of support needed to manage the system and users is much higher than that required by a wired network. Due to the broadcasting nature of a wireless system, security is an important concern and provisions should be made for guest / unauthorized users to use the system in a limited and controlled way. Additional support by the IT Team is often required to configure a user to use the wireless network, to ensure the wide variety of hardware will work with the College’s wireless system, and to provide Help Desk support for wireless…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This article gives a high level overview into the 802.11ac wireless standard. 802.11ac is also referred to as “gigabit Wi-Fi” and will be capable of significantly faster data transfer speeds than the current 802.11n. This article includes information on frequency, channels, spatial streams, beam forming and backwards compatibility. PC World is an internationally renowned computer magazine that is published monthly in print and digital form. PC World was established in 1983. The company offers advice, recommendations and information on a wide variety of technological hardware and software. The information in this article shares content that is relevant to the main points of the thesis statement (Bradley, 2012).…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The advent of wireless technology is due in part to the ever increasing demands for mobility and flexibility in our daily lives. A wireless LAN (WLAN) is based on cellular architecture where the system is subdivided into cells,…

    • 929 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    In this document, I will be showing how simple and useful the WAN is. The WAN is used like the LAN that most are used to using now, but are unable to connect to another location thru the Internet. Security is a big concern to most companies so I will be examining this network design in detail with the (WTLS) Wireless Transport Layer Security. This safeguard protects against an attack by monitoring computers settings in and around the network. With Acme the company is based in various locations geographically and expanding I will be showing how this WANS operates.…

    • 1101 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    This case study is a practical application of all of the knowledge you have acquired from your courses in the networking curriculum over the past two years. It will allow you to demonstrate both your knowledge and experience in networking both academically and hands-on. It will also allow you to draw on what you have learned as you worked your way through the online Microsoft IT Academy Security course. It is intended to be used as first a mid-term examination and then will also be continued as your end of class project and final exam. It presents a thorough review of concepts and applications presented in courses you have taken while at JSRCC. To complete this case study, read the scenario below and perform the tasks that follow. You will perform many of these tasks in teams of two but your final reports will be written individually. In addition to your analysis you are required to submit a formal written proposal that makes specific recommendations. You will be provided additional instructions regarding the format of your project report and other requirements.…

    • 5277 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    Network Perimeter: Network perimeter is defined as the boundary between a privately-owned network, and the public network. The idea between network perimeters is that the assets of a network and the hardware and any other element of the network can be monitored and controlled from outside the organization. The concept of this trend was vital because it was quite necessary to defend the internal assets of the organization. There are numerous systems that organizations are trying to implement to help with this new trend. The belief of the organization is that there is a possibility of ensuring that the assets within the network are managed in such a way that it eliminates all the possible threats. The latest trend in setting up network perimeter is adopting of remote access.…

    • 366 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To address the issue of data confidentiality, network will include a domain (EROS) and all stations, and user will be part of the domain. Through the use of active directory (AD), users will be granted access to the organization resources, based on their function and roles in the organization. Each use will be given a network account that will allow them access to the necessary means to perform their job. The wireless configuration will allow employees to connect to EROS-Employee Wi-Fi using two levels of security; MAC filtering and user authentication. Only devices, which physical address has been authorized will have access to the secured employee wireless network. In order to prevent employees from the 4th floor to see the wireless network and attempt to connect to it, EROS SSID will not be broadcast at all. The wireless configuration is part of EROS base image, for laptops, and can be setup on EROS provide mobile devices with a script. There is also a secured EROS Guest Wi-Fi for employees’ personal devices and guests. The wireless configuration is WPA2 and uses advance encryption standard (AES). The access key to the guest wireless will be reset on a weekly basis and user is able to retrieve the updated password from EROS intranet site. The IPsec tunnel configured for the organization offers encryption, data checksum, and user authentication.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Test

    • 414 Words
    • 2 Pages

    entities, materials, or equipment are necessarily the best available for the ..... WLAN Security Best Practices .......................................................................................8-1 ...…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Enterprises has requested to look into the possibility of adding wireless capabilities to their existing network. The need for wireless is understandable. It enables employees to be productive from anywhere. If they need to travel to a potential customer in Montana, or are at a plastics conference in Hawaii the ability to connect to the Riordan’s intranet is vital. Not only does it allow the employee to continue to stay connected with work, it also allows them to share the intranet and all it has to offer to potential clients, as well as offering those potential clients use of the system for easier ordering and up to date financial and tracking information regarding their purchases. This is why a Virtual Private Network would be a good tool to add to the Riordan tool bag. It will allow the current network to stay intact as well as adding the ability to access the network from anywhere. This adds in the efficiency and productivity of Riordan and its many employees and global locations.…

    • 2267 Words
    • 10 Pages
    Powerful Essays