0% found this document useful (0 votes)
555 views

Data Security in Wireless Network

Wireless Wide Area Networks (WAN) are a popular method of wirelessly accessing data over the Internet

Uploaded by

Jass Kaur
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
555 views

Data Security in Wireless Network

Wireless Wide Area Networks (WAN) are a popular method of wirelessly accessing data over the Internet

Uploaded by

Jass Kaur
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 15

DATA SECURITY IN WIRELESS NETWORK

PREPARED BY: RAVINDER KAUR CLASS: EC-2

CONTENTS

INTRODUCTION 1. Cellular Digital Packet Data (CDPD) Introduction Operation of CDPD Features of CDPD Subscriber equipment security Network security 2.General Packet Radio Service (GPRS) Introduction Operation of GPRS Features of GPRS Subscriber security Network security 3. Virtual Private Networks (VPN) INTRODUCTION Example of a VPN connection 4. Conclusion

INTRODUCTION
Wireless Wide Area Networks (WAN) are a popular method of wirelessly accessing data over the Internet. A major concern for many corporate users of wireless WANs is data security and how to protect data that is transmitted over these wireless networks. There are many features of these wireless networks, which provide user and data security. This paper discusses the security features for CDPD, and GPRS networks, as well as an introduction to virtual private networks (VPN) and how these applications can be used to enhance the overall security of data on wireless networks. For each of the technologies presented in this paper, a brief overview of the wireless network is given, followed by a discussion

of each of the features of that network that contribute to the overall security of the network.

CELLULAR DIGITAL PACKET DATA (CDPD) INTRODUCTION


CDPD is a secure, proven, and reliable protocol that has been used for several years by law enforcement, public safety, and mobile professionals to securely access critical, private information. CDPD has several features to enhance the security of the mobile end users data and these are discussed below.

1.2 OPERATION OF CDPD: -

CDPD network structure

FEATURES OF CDPD:

Subscriber equipment security Network Security Private Networks

GENERAL PACKET RADIO SERVICE (GPRS)


Introduction: GPRS is based on GSM technology; the most widely used global wireless technology. The security architecture is therefore a solid, proven technology. GPRS networks have many security features that ensure protection of user identities, subscriber equipment, and user data.

Operation of GPRS: -

Features of GPRS:

Subscriber Security Network Security

VIRTUAL PRIVATE NETWORKS (VPN)


INTRODUCTION: Even though each of the wireless networks discussed provides a high level of security to prevent interception of data ,many users require an end-to-end security solution. This would protect data integrity at all points from the mobile users computer to the host network. For customers wanting additional security, an end-to-end VPN connection provides the best security. Traffic is encrypted at the VPN client on the mobile device and is decrypted at the corporate VPN server. Thus, all traffic is encrypted as it travels through the whole connection. Authentication is also in the hands of the subscribers organization.

VPN overview: An IP-based VPN allows you to temporarily create or join a private network across an existing public network by creating an encrypted tunnel between two hosts. This tunnel allows you to securely transfer information and access remote resources. A VPN has the benefits of being a secure method of transmitting data ,while still being cost effective.

Example of a VPN connection: -

Without a VPN

With a VPN tunnel

Strengths of a VPN: A VPN is able to offer secure access to data and provides different levels of security that include tunneling, authentication, authorization. VPN have lower hardware, software, and network costs, which reduce the total cost of a secure a network. Operating costs are also lower, since there are no leased lines, or long-distance telephone charges for remote access. VPN infrastructure is easily adapted and expanded as an organization, and its networking requirements, grow. A VPN is more flexible than a fixed network and can be reconfigured by changing software parameters, without changing the physical network.

Conclusion
There are many features of wireless WANs that provide user authentication and data security. These are intended to provide data protection within the carriers network but do not extend to the Internet and beyond. When a VPN is used with these networks, it provides end-to-end security for all data sent over the Internet.

Thank you!!

You might also like