Data Security in Wireless Network
Data Security in Wireless Network
CONTENTS
INTRODUCTION 1. Cellular Digital Packet Data (CDPD) Introduction Operation of CDPD Features of CDPD Subscriber equipment security Network security 2.General Packet Radio Service (GPRS) Introduction Operation of GPRS Features of GPRS Subscriber security Network security 3. Virtual Private Networks (VPN) INTRODUCTION Example of a VPN connection 4. Conclusion
INTRODUCTION
Wireless Wide Area Networks (WAN) are a popular method of wirelessly accessing data over the Internet. A major concern for many corporate users of wireless WANs is data security and how to protect data that is transmitted over these wireless networks. There are many features of these wireless networks, which provide user and data security. This paper discusses the security features for CDPD, and GPRS networks, as well as an introduction to virtual private networks (VPN) and how these applications can be used to enhance the overall security of data on wireless networks. For each of the technologies presented in this paper, a brief overview of the wireless network is given, followed by a discussion
of each of the features of that network that contribute to the overall security of the network.
FEATURES OF CDPD:
Operation of GPRS: -
Features of GPRS:
VPN overview: An IP-based VPN allows you to temporarily create or join a private network across an existing public network by creating an encrypted tunnel between two hosts. This tunnel allows you to securely transfer information and access remote resources. A VPN has the benefits of being a secure method of transmitting data ,while still being cost effective.
Without a VPN
Strengths of a VPN: A VPN is able to offer secure access to data and provides different levels of security that include tunneling, authentication, authorization. VPN have lower hardware, software, and network costs, which reduce the total cost of a secure a network. Operating costs are also lower, since there are no leased lines, or long-distance telephone charges for remote access. VPN infrastructure is easily adapted and expanded as an organization, and its networking requirements, grow. A VPN is more flexible than a fixed network and can be reconfigured by changing software parameters, without changing the physical network.
Conclusion
There are many features of wireless WANs that provide user authentication and data security. These are intended to provide data protection within the carriers network but do not extend to the Internet and beyond. When a VPN is used with these networks, it provides end-to-end security for all data sent over the Internet.
Thank you!!