Académique Documents
Professionnel Documents
Culture Documents
Abstract
The Assignment includes an introduction part and general types of wireless networks and their applications to wireless standards, to later on continue with the wireless security. This assignment also covers the graphic representation of wireless subscriber base in INDIA. My idea was to cover also the impact of this new technology in the modern world and changes made. The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. Undoubtedly, Wireless networks are changing the way people connect to each other and that very fast. This kind of networks has become popular since the first days of introduction and use. The growing popularity of mobile hand-held devices has ignited the growth of wireless networks over the past few years. As the popularity of wireless networks increases, they are fast becoming a subject to a variety of intrusions. A number of security solutions have been proposed to protect the wireless resources, but none of these solutions have found a global acceptance. This assignment tries to evaluate these solutions and explore the various directions in wireless security.
Table of Content
I. Abstract
Wireless Revolution:Wireless Revolution means in simple terms the replacement of wires used for communication, by wireless environment. For instance Local area network (LAN) has been replaced by WLAN (Wireless LAN), similarly fixed line telephones have been replaced by Mobile handsets including satellite handsets
Source: - India-telecom-report-wireless-subscribers
Source: - India-telecom-report-wireless-subscribers
Particulars Total Subscribers Total Net Addition % of Monthly Growth Urban Subscribers Urban Subscribers Net Addition % of Monthly Growth Rural Subscribers Rural Subscribers Net Addition % of Monthly Growth Teledensity Urban Teledensity Rural Teledensity Share of Urban Subscriber Share of Rural Subscriber
Wireless
Total Wireless + Wire line 826.93 34.55 861.48 15.34 -0.18 15.17 1.89% -0.51% 1.79% 547.42 25.94 573.36 9.38 -0.09 9.28 1.74% -0.36% 1.65% 279.51 8.61 288.12 5.97 -0.08 5.88 2.18% -0.94% 2.09% 69.19 2.89 72.08 152.41 7.22 159.63 33.44 1.03 34.47 66.20% 75.08% 66.56% 33.80% 24.92% 33.44% Source: - India-telecom-report-wireless-subscribers
Wire line
What is Wireless: Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or the entire communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing; these are also sometimes classified as wireless. There are basically three different types of wireless networks WAN, LAN and PAN:
Wireless Network
WWAN
WLAN
WPAN
1. Wireless Wide Area Networks (WWAN): WWANs are created through the use of mobile phone signals typically provided and maintained by specific mobile phone (cellular) service providers. WWANs can provide a way to stay connected even when away from other forms of network access. a) Global System for Mobile Communication (GSM) a digital mobile telephone system. b) General Packet Radio Service (GPRS) - a packet-based wireless communication service that provides continuous connection to the Internet for mobile phone and computer users. c) Enhanced Data GSM Environment (EDGE) - a faster version of the Global System for Mobile (GSM) wireless service. d) Universal Mobile Telecommunications System (UMTS) - a broadband, packet based system offering a consistent set of services to mobile computer and phone users no matter where they are located in the world. e) Wireless Application Protocol (WAP) - a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access.
2. Wireless Local Area Network (WLAN): WLAN are wireless networks that use radio waves. The backbone network usually uses cables, with one or more wireless access points connecting the wireless users to the wired network. The range of a WLAN can be anywhere from a single room to an entire campus. A wireless local area network (WLAN) links two or more devices using a distribution method, and usually providing a connection through an access point to the wider internet. Gives the user the mobility to move around within a local coverage area & still be connected to the network. Wi-Fi: Wi-Fi is increasingly used as a synonym for 802.11 WLANs. Fixed Wireless Data: This implements point to point links between computer or networks at two locations, using microwave or laser beams over line of sight paths.
3. Wireless Personal Area Network (WPAN): WPANs are short-range networks that use Bluetooth technology. They are commonly used to interconnect compatible devices near a central location, such as a desk. A WPAN has a typical range of about 30 feet. Example Bluetooth provides a WPAN for interconnecting a headset to a laptop
Wireless Security & Control:The growing popularity of mobile hand-held devices has ignited the growth of wireless networks over the past few years. As the popularity of wireless networks increases, they are fast becoming a subject to a variety of intrusions. A number of security solutions have been proposed to protect the wireless resources, but none of these solutions have found a global acceptance. Some are discussed below: Security Problem: -1 Easy Access (Piggybacking) Wireless LANs are easy to find. Which means that your 802.11 network and its parameters are available for anybody with an 802.11 card. Attackers with high-gain antennas can find networks from nearby roads or buildings and may launch attacks without having physical access to your facility. Solution:Enforce Strong Access Control Easy access does not need to be synonymous with vulnerable. Wireless networks are designed for connectivity, but can be tightened dramatically if your security policy calls for it.
Security Problem: -2 Unauthorized Use of Service Wireless Networks are easy to find and once the person get connected with that wireless he can use the services unauthorizely. Solution:Design and Audit for Strong Authentication Wireless access point device likely shipped with a default password. Default passwords for various manufacturers are widely known and can be used to gain unauthorized access to your network. To protect from these unauthorized use of service change the default password and design a strong authentication.
Security Solution
Use the latest Wi-Fi technologies such as 802.11g and 802.11n that have more advanced modulation methods. Use encryption technologies such as 802.1x, EAP, TLS, RADIUS, to protect SSID and other user identities. Use 802.11i (WPA 2) with AES technologies for strong encryption. Encrypt wireless traffic using a VPN (Virtual Private Network), such as IPSEC or other VPN solutions. Use encryption for all applications over the wireless network, e.g., use SSH and TLS/HTTPS. Use a proxy with access control for outgoing requests (web proxy, and others).
Denial of Service (DoS) attacks: using a wireless client to insert bogus packets into the wireless LAN to cause access point malfunction, or using a high power signal generator to produce RF interference to block other radio NICs from accessing the medium.
Regularly test the security of wireless network. Enable strict logging on all devices, and check wireless log files regularly to see if security policy is still adequate.
10
Bibliography
Meaning and Definition:
http://searchmobilecomputing.techtarget.com/definition/wireless
Others: http://www.labnol.org/tech/types-of-wireless-networks/13667/
10