Preview

Wi-Fi Security

Powerful Essays
Open Document
Open Document
1913 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wi-Fi Security
Wi-Fi is the system of wireless connecting devices, which use some radio waves that allow for the connection between the devices without expenses of the cumbersome cable or without requiring them for being facing the other. Wireless-Fidelity (Wi-Fi) network would provide the computer experts with option to remove the wired network (Wekhande, 2006). Badly secured Wi-Fi networks may be utilized for attacking the networks as well as corporations from inside, rather than about attempting to do that externally by Internet. The purpose of the report is to describe about the Wi-Fi Security. Firstly it discusses Wi-Fi (802.11) Security. Then it reviews the risks as well as the precautions prior to opening the Wi-Fi network for the others, after that it gives recommendations for closing the Wi-Fi Network to the strangers and how to be alert while sending very sensitive information over the Wi-Fi Networks.
What is Wi-Fi Security?
Wi-Fi is cryptographic based methods for enabling the security. Wired Equivalent Privacy as well as Wi-Fi Protected Access security techniques give us security (Rowan, 2010). Privacy: the data that has been transmitted within a network must not be readable to anybody however those communicating. Authentication: Only clients who are aware about shared secret can connect to network. Wi-Fi Protected Access had been initial cryptographic protocol which has been made for the Wi-Fi for enabling the privacy as well as authentication. But Wi-Fi Protected Access had not been fully secure. For rectifying the security issues with Wi-Fi Protected, Wi-Fi Alliance has introduced cryptographic protocol i.e. Wi-Fi Protected Access. From that time the general practice about securing the Wi-Fi Protected Access enabled network with the passwords was discovered of being vulnerable towards the offline dictionary attack. Even if Wi-Fi Protected Access has been thought to be very secure rather than from the dictionary attack, this had been the quick fix to problems in



References: A.K.M Nazmus Sakib, e. a. (2011). Security Improvement of IEEE 802.11i Wi-Fi Protected Access 2 Fleishman, G. (2011). How to stay safe at a public Wi-Fi hotspot. Gold, S. (2011). Cracking wireless networks. Network Security , 14-17. Helping Define 802.11n and other Wireless LAN Standards. (2012). Retrieved February 12th, 2012, from http://www.intel.com: http://www.intel.com/standards/case/case_802_11.htm Kjell J. Hole, E. D. (2005). Securing Wi-Fi Networks. Published by the IEEE Computer Society , 28-34. Ku, A. (2011). Wi-Fi Security: Cracking WPA With CPUs, GPUs, And The Cloud. Retrieved February 12th, 2012, from http://www.tomshardware.com: http://www.tomshardware.com/reviews/wireless-security-hack,2981.html Lehembre, G. (2005). Wi-Fi security – WEP, WPA . http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_EN.pdf . Reynolds, J. (2003). Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network Roeder, F. O. (2003). Wi-Fi Handbook. New York: McGraw-Hill. Rowan, T. (2010). Negotiating WiFi security. Network Security , 8-11. Sheldon, T. (2001). Encyclopedia of Networking. New York: McGraw-Hill. US-CERT. (2006). Using Wireless Technology Securely. Government organization. Waring, B. (2007). How to Secure Your Wireless Network. PCWorld . Wekhande, V. (2006). WI-FI TECHNOLOGY: SECURITY ISSUES. RIVIER ACADEMIC JOURNAL, VOLUME 2 , 1-17. Wireless Security. (2012). Retrieved February 12th, 2012, from http://www.findingdulcinea.com: http://www.findingdulcinea.com/guides/Technology/Internet/Internet-Security/Wireless-Security.html

You May Also Find These Documents Helpful

  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    2. To prevent outsiders from exploiting connected resources and sniffing data that is being transmitted. The best encryption method is WPA2.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Another way to protect your WLAN is with WPA (WI-FI Protected Access). WPA is an upgrade to the WEP(Wired Equivalent Privacy). WEP regulates access to wireless network through a devices hardware-specific MAC address.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 351 Words
    • 2 Pages

    The WLAN should be encrypted to help prevent unauthorized access to the network. Strong password policies should be in place just as it should for a normal LAN. Users should be trained to not access sensitive data across the WLAN as it is more easily intercepted than a hard line connection.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Effective data encryption comes standard on your home network wireless router and information transmitted cannot be read without the correct encryption key. Password protection can be enabled on all devices and users should choose strong passwords of adequate length. Thefts of wireless devices are on the rise. Users can learn ways protect themselves and the device from crime, and make a loss or theft known the employer or carrier for fast action.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    eviltwinattack

    • 3867 Words
    • 15 Pages

    According to a recent study, 42% of wireless 802.11 access points (APs) provide no security mechanisms — not even WEP or WPA [1]. Often times, wireless APs are left open for convenience. For example, a coffee shop or bookstore may wish to offer a free wireless service, so there is no need to authenticate its wireless users. However, wireless clients that use these APs are vulnerable to a number of trivial threats such as eavesdropping and injection attacks. An additional and often over-looked vulnerability caused by using open APs is the access point impersonation attack.…

    • 3867 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Josh

    • 6922 Words
    • 28 Pages

    References: 1. Andrea Bittau, Mark Handley, and Joshua Lackey. The final nail in WEP’s coffin. In IEEE Symposium on Security and Privacy, pages 386–400. IEEE Computer Society, 2006. 2. Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications: the insecurity of 802.11. In ACM MobiCom 2001, pages 180–189. ACM Press, 2001. 3. Rafik Chaabouni. Break WEP faster with statistical analysis. Technical report, EPFL, LASEC, June 2006. http://lasecwww.epfl.ch/pub/lasec/doc/cha06. pdf. 4. Stefan D¨rh¨fer. Empirische Untersuchungen zur WLAN-Sicherheit mittels o o Wardriving. Diplomarbeit, RWTH Aachen, September 2006. (in German).…

    • 6922 Words
    • 28 Pages
    Good Essays
  • Good Essays

    Nowadays, Wi-Fi becomes a critical role in Hotel Business. As you know that, in today’s digitally connected world, all PC’s have Wi-Fi and an estimated 85% of mobile phone also has built in the Wi-Fi. In addition, guests in Hotel desire for access to the Internet during their stay continue to be strong. In the following, I will briefly describe about the advantage of using Wi-Fi in Hotel Business.…

    • 1141 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    [The rapid growth and development of mobile systems over the past years has exposed the capability and effective availability of mobile communication and thus paved the way for secure transmission and execution of data. Mobile communications also provide us too many type of connection to access to internet with their few security mechanisms build inside. ]…

    • 561 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a MANET is independently free to move in any direction, and will therefore change its connections to other devices frequently. So one of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists.…

    • 910 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    [13] Ramaraj, E and Karthikeyan, S, “ A Design of Enhanced Security Protocol for Wireless Communication…

    • 3590 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Google Wi-Spy

    • 3366 Words
    • 14 Pages

    Securing Wi-Fi Network, Blog. Securing Wi-Fi Network. June 27, 2013. http://googleblog.blogspot.com/2013/06/securing-your-wifi-network.html (accessed June 27, 2013).…

    • 3366 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    When used with other 802.11g WPA (WiFi Protected Access) and 802.1x compatible products in a network with a RADIUS server, the security features include:The multihop wireless environment is characterized by harsh propagation channels, interference, frequent and rapid changes in network topology, a lack of centralized network control, and the requirement of multihop communication from source to destination.Many of present wireless network applications will require that mission-critical data should be guaranteed to be delivered to their corresponding targets in time. However, end-to-end QoS (Quality of Service) assurance in multihop networks is a very challenging topic [1][2].For home users that will not incorporate a RADIUS server in their network, the security for the DI-524, used in conjunction with other 802.11g products, will still be much stronger than ever before. Utilizing the Pre Shared Key mode of WPA, the DI-524 will obtain a new security key every time it connects to the 802.11g network. You only need to input your encryption information once in the configuration menu. No longer will you have to manually input a new WEP key frequently to ensure security, with the DI-524, you will automatically receive a new key every time you connect, vastly increasing the safety of your…

    • 2425 Words
    • 10 Pages
    Powerful Essays

Related Topics