Preview

Wireless Network, Security and Standards

Powerful Essays
Open Document
Open Document
2064 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Network, Security and Standards
Wireless Network, Security and Standards
With the invention of wireless network access, every changing 802.11 standards and wireless home network being installation in every family’s household, many families have so much freedom when accessing the internet, photos, music and movies. The sharing of media is a big part of everyday life but the main problem with having unlimited, continuous connection for sharing such media is the threats to everyday use. Simple steps should and can be taken to ensure a safe environment, but way to often many people have the mindset of “that’s not going to happen” or “I have a password on my Wi-Fi and so I am safe”. The risk of and having ones credit card, bank account, social security number and identity stolen should be the focuses of any new installation of a home wireless network, Nevertheless, while password protection of home Wi-Fi is a start, in today’s world this security feature just is not enough. With the booming technology of Bluetooth smart phones, IPod’s, IPad’s and tablets the readiness of internet and sharing media go hand in hand but the mindset of protecting these devices needs to be main focus of consumer’s today.

The Invention of Wireless Network

Wi-Fi or WLAN also known as wireless local area network saw its development in 1971 by a professor named Norman Abramson at the University of Hawaii. Professor Abramson had a system constructed of a few computers on different inlands connected together using ham-like radios and is credited with the first known wireless network. With the development of wireless network, a standard for the use of wireless was created. The Institute of Electrical and Electronics Engineers or IEEE created the 802.11 standard and a special publication 800-48 from National Institute for Standards and Technology written by Tom Karygiannis and Les Owens was released. In this publication, Mr. Karygiannis and Mr. Owens (2004) state that WLANs were created on the IEEE 802.11 standard, and



Cited: Baxi, Sameer, Masand, Sunil, Portas, Veronica. “Wireless Network Security 802.11 WLANs”, 2006, October 24, 2013 Brown, Clint W, “802.11ac: Wi-Fi® for the Next-Generation of Wireless Connectivity”, Wi-Fi Alliance, October 02, 2013, November 8, 2013 Enhanced Wireless Consortium, “WLAN IEEE 802.11n standards” EWC NEWS December 2, 2011, October 24, 2013 . HELP NET SECURITY, “Bluetooth vulnerabilities becoming easier to exploit” September 21, 2011, October 24, 2013 Karygiannis, Tom and Owens, Les, “Wireless Network Security 802.11, Bluetooth and Handheld Devices”, National Institute for Standards and Technology. 2004, October 24, 2013 Radack, Shirley January “SECURITY OF CELL PHONES AND PDAS”, National Institute of Standards and Technology, January 2009, November 6, 2013 Yu, Shuang, “AMENDMENTS IN IEEE 802.11ad ENABLE MULTI-GIGABIT DATA THROUGHPUT AND GROUNDBREAKING IMPROVEMENTS IN CAPACITY”, IEEE Standards Association, January 8, 2013, November 14, 2013 Standards Association, January 8, 2013, November 14, 2013

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 2 Case Study

    • 257 Words
    • 2 Pages

    1. The first standard was created in 1997 by the Institutue of Electrical and Electronics Engineers (IEEE). They called it 802.11 which only supported a maximum network bandwidth of 2 Mbps- too slow for most applications.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The IEEE 802.11n draft standard is intended to improve WLAN data rates and range without requiring additional power or RF band allocation.…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Best Essays

    Wolter, D. R., Andrews, J. G., and Chen, R., “Broadband Wireless Access with WiMax/8O2.16: Current Performance Benchmarks and Future Potential”, IEEE Communications Magazine, vol. 43, no. 2, February 2005…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Better Essays

    * While consumer PC products have just started to migrate to much higher bandwidth 802.11n, now the work on next generation WLAN standard definition is already in progress. Named as 802.11ac, it is expect to boost the network bandwidth up to 1Gbps, on par with what can be achieved by wired networking in today’s PC world.…

    • 820 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Lincoln’s life in Indiana wasn’t really easy. Wild animals were around his home and Lincoln wasn’t really educated in the terms of going to school. He only went to school for a short amount of time, but he still managed to remember how to read and write. Lincoln’s mother died in 1818 and his father remarried a widow named Sarah Bush Johnston. In 1830, the Lincoln family again moved to another state. The family this time moved to Illinois. A year later, Abraham Lincoln left his home for a town near Springfield, Illinois. In his new surroundings, Lincoln had several jobs and even served in a war called the Black Hawk War in 1832 (NSP, 1924). During the war, he was elected as captain of his volunteer group.…

    • 128 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    A. Ghosh, R. Muhamed, and J. Andrews, “Overview of WiMAX,” in Fundamentals of WiMAX – Understanding Broadband Wireless Networking, Upper Saddle River, NJ: Prentice Hall, 2007.…

    • 2185 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    References: ISCO . (2012) 802.11ac: The Fifth Generation of Wi-Fi Technical White Paper. [Online] Available from: http://www.cisco.com/c/en/us/products/collateral/ wireless /aironet-3600-series/white_paper_c11-713103.html.[Accessed: 5th October 2014].…

    • 2329 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    The rapid adoption and highly distributed nature of wireless networks has made it vulnerable to attacks and calls for innovative strategies of defense for network security. The lack of cables and transfer of information over airwaves makes data exchange very susceptible to interception. Furthermore, it is difficult to implement effective methods of security without sacrificing the quality and speed of network operations. For these reasons, wireless security is a topic of much interest and will be the basis of discussion for this paper. For the sake of cohesion, we will specifically discuss wireless security on the wireless network protocol IEEE 802.11 (or Wi-Fi) and its use in managed networks (or Infra-structured) though many of the topics discussed apply to other protocols as well. In our discussions, we will conduct a survey of both encryption based and non-encryption based attacks.…

    • 7348 Words
    • 30 Pages
    Better Essays
  • Powerful Essays

    War Driving

    • 1481 Words
    • 6 Pages

    With the technological advances in the way we transmit information over the past forty years have come new challenges for security experts. None of these challenges have been more complicated than that of securing information saved on a computer or a network of computers. It seems with every new security measure implemented to protect this information, there is someone who discovers a way of manipulating this new measure to gain access. One of the technological advances that have created a huge challenge for security specialists is the use of wireless internet connections.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Clark, R. (2014). Cyber security for smart mobile devices. Control Engineering, 61(8), 32-36. Retrieved from http://www.controleng.com/single-article/cyber-security-for-smart-mobile-devices/00767fbf028f3ac78fd519551fdc4c5e.html…

    • 1279 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    This report on “Wireless Network Security” is submitted in accordance with your assignment for November 23, 2010.…

    • 6120 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    In this tram paper we try to focus on wireless security and threats. Now a day wireless networking is get fame day by day and mostly user prefer or like wireless network because it easy to use. WLAN wireless local area network popularity gained is due to many reasons such as ease of installation flexibility mobility reduced cost of ownership and scalability.…

    • 948 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Cisco Wireless Compliance

    • 6685 Words
    • 27 Pages

    © 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.…

    • 6685 Words
    • 27 Pages
    Satisfactory Essays
  • Best Essays

    5.1 Use Case Diagram

    • 2225 Words
    • 9 Pages

    3. S.Prasanna, Srinivasa Rao, “An Overview of Wireless Sensor Networks Applications and Security”, International Journal of Soft Computing and Engineering, vol.2, no.2, May 2012, pp. 538-540.…

    • 2225 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    This paper begins by introducing the concept of WLAN. The introductory section gives brief information on the WLAN components and its architecture. In order to examine the WLAN security threats, this paper will look at Denial of Service, Spoofing, and Eavesdropping. The paper will then explain how Wired Equivalent Privacy (WEP) works, which is the IEEE 802.11b/WiFi standard encryption for wireless networking. The discussion of WEP continues by examining its weaknesses, which result in it being much less secured than what was originally intended. This situation leads to further research regarding practical solutions in implementing a more secured WLAN. This paper will also cover the new standards to improve the security of WLAN such as the IEEE 802.1x standard, which comprises of three separated sections: Point-to-Point Protocol (PPP), Extensible Authentication Protocol (EAP) and 802.1x itself. The 802.1x is actually included in 802.11i, a newly proposed standard for key distribution and encryption that will play a big role in improving the overall security capabilities of current and future WLAN networks. The 802.11i standard provides two improved encryption algorithms to replace WEP, which are Temporal Key Integrity Protocol (TKIP) and CBC-MAC Protocol (CCMP). This paper will also list down several products that will assist users to protect their wireless networks from attacks. Finally, this paper ends with the conclusion of highlighted issues and solutions.…

    • 5329 Words
    • 22 Pages
    Powerful Essays