Skip to main content

Wireless LAN Security

Wireless local area networks (WLANs) based on the Wi-Fi (wireless fidelity) standards are one of today's fastest growing technologies in businesses, schools, and homes, for good reasons. They provide mobile access to the Internet and to enterprise networks so users can remain connected away from their desks. These networks can be up and running quickly when there is no available wired Ethernet infrastructure. They can be made to work with a minimum of effort without relying on specialized corporate installers.

Some of the business advantages of WLANs include:
" Mobile workers can be continuously connected to their crucial applications and data;
" New applications based on continuous mobile connectivity can be deployed;
" Intermittently mobile workers can be more productive if they have continuous access to email, instant messaging, and other applications;
" Impromptu interconnections among arbitrary numbers of participants become possible.
" But having provided these attractive benefits, most existing WLANs have not effectively addressed security-related issues.

THREATS TO WLAN ENVIRONMENTS

All wireless computer systems face security threats that can compromise its systems and services. Unlike the wired network, the intruder does not need physical access in order to pose the following security threats:

Eavesdropping

This involves attacks against the confidentiality of the data that is being transmitted across the network. In the wireless network, eavesdropping is the most significant threat because the attacker can intercept the transmission over the air from a distance away from the premise of the company.

Tampering

The attacker can modify the content of the intercepted packets from the wireless network and this results in a loss of data integrity.

Unauthorized access and spoofing

The attacker could gain access to privileged data and resources in the network by assuming the identity of a valid user. This kind of attack is known as spoofing. To overcome this attack, proper authentication and access control mechanisms need to be put up in the wireless network.

Comments

Popular posts from this blog

Daknet

Now a day it is very easy to establish communication from one part of the world to other. Despite this even now in remote areas villagers travel to talk to family members or to get forms which citizens in-developed countries an call up on a computer in a matter of seconds. The government tries to give telephone connection in very village in the mistaken belief that ordinary telephone is the cheapest way to provide connectivity. But the recent advancements in wireless technology make running a copper wire to an analog telephone much more expensive than the broadband wireless Internet connectivity. Daknet, an ad hoc network uses wireless technology to provide digital connectivity. Daknet takes advantages of the existing transportation and communication infrastructure to provide digital connectivity. Daknet whose name derives from the Hindi word "Dak" for postal combines a physical means of transportation with wireless data transfer to extend the internet connectivity that a upl...

Face Recognition Technology

Humans are very good at recognizing faces and if computers complex patterns. Even a passage of time doesn't affect this capability and therefore it would help become as robust as humans in face recognition. Machine recognition of human faces from still or video images has attracted a great deal of attention in the psychology, image processing, pattern recognition, neural science, computer security, and computer vision communities. Face recognition is probably one of the most non-intrusive and user-friendly biometric authentication methods currently available; a screensaver equipped with face recognition technology can automatically unlock the screen whenever the authorized user approaches the computer. Face is an important part of who we are and how people identify us. It is arguably a person's most unique physical characteristic. While humans have had the innate ability to recognize and distinguish different faces for millions of years, computers are just now catching up. Visi...

Challenges in the Migration to 4G

Second-generation (2G) mobile systems were very successful in the previous decade. Their success prompted the development of third generation (3G) mobile systems. While 2G systems such as GSM, IS-95, and cdmaOne were designed to carry speech and low-bit-rate data, 3G systems were designed to provide higher-data-rate services. During the evolution from 2G to 3G, a range of wireless systems, including GPRS, IMT-2000, Bluetooth, WLAN, and HiperLAN, have been developed. All these systems were designed independently, targeting different service types, data rates, and users. As all these systems have their own merits and shortcomings, there is no single system that is good enough to replace all the other technologies. Instead of putting efforts into developing new radio interfaces and technologies for 4G systems, which some researchers are doing, we believe establishing 4G systems that integrate existing and newly developed wireless systems is a more feasible option. Researchers are currentl...