Study On Wireless Network Security
Study On Wireless Network Security
ABSTRACT
This is study on wireless network security. Since wireless communication has a different form of physical transport
than a wired communication environment, we have to use different measures to secure the network in a wireless
environment. Wireless networks have more threats and security vulnerabilities and we need effective management
for this technology.
Wireless networks have very important features, as they provide the company and the user with flexibility and
portability within budget. It allows users to access networks without physical cabling tied between them.
1. INTRODUCTION
Wireless securities stop unauthorized access cause damage to computers and device using wireless networks.
Today, Companies and individuals use wireless technology for important communication progressively they want to
keep private and secure, such as e-commerce transactions, email, and other corporate data transmissions. Same
time Wireless platforms mature, become more popular, and store Valuable information; hackers are increasing their
attacks on these new goals. Security Mechanisms in Wireless Networks are required to protect and provide security
for data integrity, access control, and authentication, quality of service, user privacy, and continuity of service. They
also play a fundamental role in Protect wireless network functionality The popularity of wireless networks is
primarily a testament to their convenience, cost Efficiency integration with other networks and it's components. The
computers sold to consumers today due to security purpose . Network technology The benefits of wireless networks
include convenience, mobility, Productivity, implementation, expandability, and cost.
2. Wireless Vulnerabilities
A wireless network consists of four basic components: data transmission. using radio frequencies; Access points that
provide a connection to the organization. the client's network and/or device (laptop, PDA, etc.); and user. each of
these components provide an opportunity for attack that may result in the compromise of one or exceed the three
fundamental security objectives of confidentiality, integrity and Availability.
End users are not security experts and may not be aware of the risks that occur by wireless LANs.
Almost all access points that have default settings have not enabled WEP protection.
Most users do not change the default access point password used by all factory vendor products.
To access the Internet over a wireless network, the clients are connected to the access point and the AP is
connected to the wireless router. The function of a wireless router is to transmit a signal over the air and all wireless
clients within range can connect to the wireless network.
Wired Equivalent Privacy (WEP) is a security standard for wireless or WiFi networks. It was part of the original IEEE
802.11 protocol. Since wireless networks transmit data over radio waves, eavesdropping on wireless data
transmission is relatively easy compared to wired networks connected by cables. WEP aims to provide the same
security and privacy as its wired counterparts on wireless networks.
WPA3-Personal uses a 128-bit encryption key that is communicated to both parties (AP and client) before
establishing a wireless connection. It’s a secret protocol that work for key exchange security and prevent offline
attacks.
WPA3-Enterprise uses 192-bit key-based encryption. It also uses a 48-bit initialization vector which guarantees a
minimum level of security.
Active attacks
Passive attacks
In active attacks, attackers alter information content and generate false information on the network to destroy
network security as unauthorized. Access, Active Eavesdropping, Man-in-the-middle Attack (MITM), Session
Hijacking, Denial of Service (DoS), Replay, whereas in Passive Attack, the attacker simply listens to the network
traffic, gets information from the packet, it Passive listening and traffic analysis without changing. Such attacks are
hard to detect.
Unauthorized access to the Company's wired and wireless networks a can come from many
various methods and intentions. one among these methods is termed "Accidental Union". When a
user activates the pc and a connects to A wireless access point of a neighboring company's overlay
network, the user am i able to don't even know that this happened. However, this is often a security
breach within the sense that Company proprietary information has been exposed and now a could
also be a link to company to a different. this is often very true if the laptop is additionally connected
by cable Network..
5.2 Denial of Service (DOS)
Anyone acquainted with network security knows the concept of denial of service (DoS), also called a
"spoiler." this can be one amongst the best network attacks, because it requires only limited access to
services. this will be done by placing virus or worm programs on your network, or by sending large
amounts of traffic to a particular target with the intention of slowing down or stopping wireless
services. this enables attackers to hijack resources, view unauthorized information disclosure, and
introduce backdoors into systems. In wireless networks, the signal is intercepted under
various varieties of techniques. Whenever a wireless LAN uses the two.4 GHz band, interference
occurred like microwave or a competing access point on similar because it is channel. Since the two.4
GHz band is proscribed to only three channels that don't overlap (in the US), an attacker only has
to interfere with these enough to cause a service disruption. A denial of service attack may occur in
conjunction with an unauthorized access point. for instance, it will be set to a
channel that's not employed by a sound access point. A denial of service attack can then be launched
on a channel that's currently in use, causing endpoint devices to do to reconnect on a
unique channel that's utilized by the rogue access point.
A Denial of Service (DoS) attack occurs when an attacker continuously bombs Target AP (Access
Point) or network with bogus requests, premature success Connection messages, fault messages
and/or other commands. this reason is valid Users are unable to access the network and might even
cause the network to hold. These attacks are supported the misuse of protocols like extensible
authentication. Protocol (EAP)
5.3 Malicious Companion
"Malicious associations" are those within which hackers can actively create wireless devices. to
attach to the corporate network through your laptop rather than the corporate Access Point (AP). this
sort of laptop is thought as a "soft AP" and is formed when A cracker runs software that creates your
wireless network card look alike valid access point. Once the cracker has reached, it can steal the
password, Launch attacks on wired networks, or Plant Trojans. Therefore wireless networks work
of layer 2 level, layer 3 security like network authentication and personal networks (VPNs) doesn’t
offer any kind of barriers . 802.1x wireless authentication helps security, but are still liable
Session hijacking is indirectly kind of like man within the middle attack (MITM) within which the
attacker captures the session of the victim client [8] [11]. The victim simply assumes that their
session ended for whatever reason during their session. was handed over to the attacker and he can
exploit it at will. In session hijacking, the attacker first obtains the MAC address of the victim and also
the AP, then sends a MAC separation message to the victim. Victim closes his session from the
network while his actual session AP . is opened in
5.7. Man-in-the-middle attacks
The Man within the Middle may be a very dangerous attack within which the attacker spies on the
communication and modifies it before sending it. Although the organization implemented VPN, SSH,
IPsec security measures, these measures are revolutionary through the MITM attack as these
measures can only protect against a knowledge privacy attack. during this way, all the user data
is more matured the attacker to the Accesspoint and also the attacker can't only sniff the
information but also can modify it excute the virus in download file, and then it the change web
content settings easily. Techniques won’t to deceive the user. Also, encryption doesn't play a security
role between the access point and therefore the client user
6. Securing Wireless Transmissions
Although the WEP algorithm has several flaws, it is still possible for users to secure their respective
wireless networks. To deal with the security threats mentioned above, the following techniques are
recommended to reduce the security risks involved in wireless networks.
6.1. Exploring proper knowledge to user
The first step in wireless network security is to educate users about the security of the network. It is
often observed that end users do not know how to implement security and leave many loopholes for
attackers. Minimizing security risks is quite possible if users are well-versed about wireless tool
settings/adjustments and the security of their respective networks.
6.2. Wireless Network Auditing
It is a powerful technique to secure a wireless network. The user should scan work through network
scanner to know about the activities of the network. Several free network scanning software like Net
Stumbler and Kismet is available over the internet.
6.3. Change the router's default password
Every wireless router/access point manufacturer sets a default username and password. If the user
doesn't change it, it's a really sweet cake for the attacker because the attacker simply scans the access
[2] Cisco. (2004). Dictionary attack on Cisco LEAP vulnerability, Revision 2.1, July 19.
[4] Hopper, D. I.(2002). Secret Service agents probe wireless networks in Washington.
[5] Kelley, D. (2003). The X factor: 802.1x may be just what you need to stop intruders from accessing your network.
Information Security, 6(8), 60-69.
[6] Kennedy, S. (2004). Best practices for wireless network security. Information Systems Control Journal (3).
[7] McDougall, P. (2004, March 25). Laptop theft puts GMAC customers’data at risk. Information Week Security
Pipeline.
[9] Paladugu, V., Cherukuru, N., & Pandula, S. (2001). Comparison of security protocols for wireless communications.
[11] Stoneburner, G., Goguen, A., & Feringa, A. (2002, July). Risk management guide for information technology
systems. NIST Special Publication 800-30.
[12] Wailgum, T. (2004, September 15). Living in wireless denial. CIO Magazine