06-11-2014, 09:17 PM
Wireless LAN Security Abstract
Wireless local area networks (WLAN) based on the Wi-Fi (Wireless Fidelity) is one of the fastest growing modern standards of technology in enterprises, schools and houses, for obvious reasons. They provide mobile access to the Internet and to corporate networks, so users can stay connected away from your workplace. THESE can be the network up and running quickly when there's no more wired Ethernet infrastructure. They can be made to work with a minimum of effort, not relying on corporate specialized installers.
Some of the business benefits of wireless networks include:
Mobile employees can continuously connected to their applications and key dates;
"New mobile applications based on continuous connection can be deployed;
"Maybe intermittent mobile workers more productive, if they have constant access to e-mail, instant messaging and other applications;
"Impromptu relationship between an arbitrary number of participants was made possible.
"But the presence of these attractive benefits, most of the existing WLAN were not considered safety-related issues effectively.
WLAN threat environments
All computer system makes wireless security threats that may compromised its systems and services. Unlike a wired network, an attacker does not need physical access to the following security risks:
eavesdropping
This includes attacks on confidentiality date that is passed over the network. Your wireless network, eavesdropping is the most significant threat Because the attacker can intercept the transmission of air away from company premises.
fake
An attacker can change the contents of intercepted packets from the wireless network, and this results in a loss of data integrity.
Unauthorized access and tampering
TheZloumyšlennik can get privileged access to the time and resources on the network, assuming the identity of a valid user. This type of attack known as spoofing. To counter this attack, appropriate mechanisms for authentication and access control to a wireless network.
Denial of service
In this attack, the attacker either real or network fills the invalid messages that affect the availability of network resources.TheZloumyšlennik can also flood the radio station thus forcing the STI to use valuable battery power.
Other security threats
Other threats come from weakness in the administration of the network and the vulnerabilities of wireless LAN standards, such as the vulnerability of the Wired Equivalent Privacy (WEP), which is maintained by the IEEE 802.11 standard for wireless networks.
Authentication in 802.11 wireless authentication based on station or device instead of user authentication. The specification provides for two modes of authentication: an authentication and public key authentication. 802.11 authentication process, the client consists of the following operations:
• Client sends a Probe Request frame on each channel
• Access point range is responsible for response model with frame
• The client decides which access point (AP) is the best access and sends the authentication request year
• The access point will send authentication year response
• Successful authentication, the client request frame Association will send to the access point
• Association of Access Point year answer answer
• Client can now send traffic to an access point