StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless Network Security - Research Paper Example

Cite this document
Summary
This paper "Wireless Network Security" has presented an overview of various security aspects of wireless networks.Thus the paper shows that wireless networks bring a lot of advantages and opportunities for the people but at the same time they cause a lot of security issues and problems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Wireless Network Security
Read Text Preview

Extract of sample "Wireless Network Security"

Wireless Network Security Introduction At the present, a user can use a notebook computer, laptop, Personal Digital Assistance PDA), or a mobile phone with a wireless network connection in order to use internet at any time and at any location where wireless signals are accessible (Weber and Bahadur; Makker). In other words, wireless networking has become a well liked trend that is heavily adopted by the businesses as well as individuals. In this scenario, wireless network security is a promising topic that covers a lot of critical features. At the present, there exist a lot of wireless security technologies and versatile tools for the organizations as well as individuals. This paper discusses various issues and aspects of security related features in wireless networks. The primary goal of this research is to present comprehensive discussion on various features included in wireless network security. This paper will discuss topics like wireless network security tools, their advantages and directions. And in the last it will offer some valuable recommendations. An Overview of Wireless Networks These days wireless networking has become an attractive trend and the professionals in all over the world are adopting wireless network security with advance trends and new features in order to protect their networks from various security threats. In other words it can be said that these networks have capability to launch interconnection among various devices. In this scenario, the main advantage that we gain from wireless networks as compared to other networks is that this technology releases us from the use of wires. In view of the fact that the communication among several nodes is established through radio waves thus there is no need of wires for establishing a network. Additionally, the wireless adapter which is located inside the machine transforms data into the radio frequency transmission and later on broadcasts it. In addition, wireless technology is normally acknowledged as Wi-Fi technology or simply WLAN technology. In this scenario, the wireless security is a main feature that we discuss throughout wireless networks (Makker; Moran; Turban, Leidner and McLean). Another advantage of these networks is that users of this network are not bound to limited location despite of its usage where they have facility of signals. Hence it decreases the expenditure required for cabling or wires that is required in wired networks. In addition, wireless technology helps us to release from the copper wires. Here one important thing to remember is the wireless security for Wi-Fi applications. In this growing era where technological aspects are growing with users of economy related needs, we have to fulfill all the essential requirements for establishing an effective wireless network. Thus, the wireless network security is a major issue that is to be considered while establishing wireless networks (Weber and Bahadur; Makker). Why wireless security is Important? • It is important due to the fact it is now accessible everywhere, and hardware required for it has a low cost that will facilitate a common user to purchase it from market (Asadoorian). • The aspect of Wi-Fi is used in almost every advanced application round the globe. Hence flexibility increases. We can observe that this innovative technology is now available easily in everything. We have example of those things that we use in our daily life like mobile phones to our daily life usage appliances (Asadoorian). • Although it is a true fact that the fame of Wi-Fi technological hotspots are enhancing. In most of applications wireless security is not implemented properly (Asadoorian). • As we know that Wi-Fi technology could pass through long distances thus security needs are essential for making our communication secure (Asadoorian). • An important perspective of Bluetooth is that this technology is spreading and almost used in every spot round the world but this one is vulnerable to attack (Asadoorian). Additionally analysts and observers have been focused greatly on various security related aspects of Wi-Fi technological applications (IEEE 802.11) that we mostly analyze in wireless LAN systems. In addition, present applications are making rapid growth and use of these systems into a broad range of networks. Moreover these networks are extensively used for a broad variety of applications that are usually supportive for security measures or secure solutions that meet up the needs of a broad variety of customers (Proxim Corporation). As discussed earlier that wireless security is important in our daily life, while working at home or either in an organization. We must make our wireless network secure in order to secure our personal data and information since they are most valuable to us. In view of the fact that if we have an un-safe wireless system it might allow any spy or unauthorized user to access or network and discover our personal information and working activities. However it depends extensively on the configuration of our corporation based or home based network. In this way a hacker could get complete access to our machine hard disk. This is all due to an unsecured or unsafe wireless network (Posey). In addition there are some other critical circumstances in unsecure wireless environment. It is seen and reported in some situations that a hacker can carry out some malicious act against us or else some of our neighbor may sponge off our internet connection. Thus this will not only result in decreasing actual bandwidth, for which we are paying some cost but if our fellow citizen or some naughty neighbor carries out a criminal activity using our network on internet, it could be traced back to our internet connection (Posey). Important Tools for Wireless Network Security NetsTumbler Netstumbler is a well known tool for wireless network security. It facilitates in displaying the wireless enabled access spots, Service Set Identifier (SSIDs), several channels by enabling WEP encryption or facilitate in strengthening the signals. Moreover Netstumbler could be helpful for establishing connection with communication technology like GPS for accurate log and the exact locations of access spots (Nsasoft llc.). PRISMSTUMBLER Another tool for network wireless security is Prismstumbler. This tool is basically a network communication model like wireless LAN (wireless local area network) or simply WLAN. Prismstumbler is used for scanning the signal frames from access spots or access points. Moreover, the operations performed by Prismstumbler take place through constantly switching channels and monitoring the frames that are received on the currently selected channel (Nsasoft llc.). WEPCRACK WEPCrack is basically a security protocol. WEP stands for Wired Equivalent Privacy. This tool is considered as the first one among the WEP encryption cracking utilities. However this security related tool is an open source tool that is normally used for breaking the 802.11 WEP keys. That’s why it is also written as (802.11 encryption protocol) (Nsasoft llc.). AIRSNORT There is some sort of similarity between airsnort and wepcrack. However, Airsnort is basically a wireless local area network (WLAN) tool that helps in cracking Wired Equivalent Privacy (WEP) encryption keys. This tool is vital in wireless broadcasting as well as automatic computation of the encryption keys when sufficient packets have been combined (Nsasoft llc.). Directions for Security of Wireless Networks There are some important directions provided by National Institute of Standards and Information Technology Laboratory. This organization is also known as NIST. Although NIST has published several suggestions for improving security related needs for wireless networks. It offers 3 major aspects related to wireless security of network: (Radack) Critical issues related to security are generally linked with wireless local area networks (WLANs) that are based directly with the Institute of Electrical and Electronics Engineers. This standard is commonly known as IEEE (standards 802.11) (Radack). Various issues and problems related to security of wireless personal area networks are based on the terms that meet Bluetooth specifications, developed by an industry group (Radack). The 3rd aspect is linked with the secure environment of communication. It means that security of those wireless devices that are considered as handheld (Radack).  Trends in Wireless Network Security Although each product has some problems and advantages either on user side or business side and these problems may vary from technical specification to installing arrangements. When we talk about the various aspects of wireless network security, they offer a lot of advantages. As we know that in this rapid growing technological era where new innovative trends and advanced technologies are emerging every day we have to compete in this complicated environment. In this way we can say that implementation of security techniques is essential in wireless networks so that businesses and individuals could attain the benefits of this marvelous technology (Wireless-Center). Wireless network security is always a most important issue among those who want to deploy wireless networks. Luckily, at the present both the security solutions and products offered by technology developers and user knowledge about wireless network security are improving. Thus, wireless networks offer wide-ranging security features and facilities, and through the effective protection of these networks, organizations and individuals can assertively take advantage of the features and facilities they present (Cisco). Seeing that wireless networks offer a lot of advantages, but there is a dark side to wireless networks. On the other hand, without implementing appropriate security techniques, the data and information of a business or an individual can simply be accessed on the wireless network. For instance, by means of free software available on the internet along with directional antenna, hackers can easily retrieve network traffic and important information from a distant location (Lucid Link). For many years, WEP encryption method has been used as a primary security tool between wireless clients and wireless access points. In this scenario, there emerges a problem that is WEP protocol is still basically not strong for the reason that it makes use of a static encryption key however the power of WEP encryption has augmented to a greater extent since Wi-Fi emergence. Yet, motivated hackers can without difficulty hack WEP encryption by making use of freely available hacking tools. Thus, in this scenario, prior to the implementation of wireless network, people should remember that they may need to change their security technique to include WPA and/or the similar security measures that are offered by the IEEE (B. M. Posey). Recommendations for Securing Wireless Networks In this growing era where wireless network is one of the emerging trends that is considered more flexible than other networks we need such an environment where security is possibly enabled for users. However mostly advanced developments face various security risks that might be tackled bitterly for ensuring that vital assets remain protected. So we must assess the threats we can face, make analysis and evaluate the overall safety controls of systems for wireless networks. On the other hand, the maintenance of a secure wireless network is a continuing procedure that initially requires greater effort as compared to new networks and structures (Radack).  Conclusion We depend a lot on wireless communication networks in this technological era. Security based implications are most important for service providers as well as for users and users want to solve these critical concerns by service providers and network designers. Hence security of wireless networks is a promising area for future research. This paper has presented an overview of various security aspects of wireless networks. This paper has shown that wireless networks bring a lot of advantages and opportunities for the people but at the same time they cause a lot of security issues and problems. This paper has discussed the tools and technologies which can be used to deal with these security issues. Works Cited Asadoorian, Paul. PaulDotCom. 2011. 21 April 2011 . Cisco. Securing Wireless Networks. 2011. 18 April 2011 . Lucid Link. The Benefits of Wireless Networks. 2007. 19 April 2011 . Makker, Aneesh M. Wireless Network Security Basics . 2010. 24 April 2011 . Moran, Joseph. Wireless Home Networking, Part 2, WiFi Standards. 05 November 2002. 03 April 2011 . Nsasoft llc. Wireless Network Security. 26 December 2005. 22 April 2011 . Posey, Brien M. WPA wireless security offers multiple advantages over WEP. 10 September 2003. 21 April 2011 . Posey, Brien. Wireless Network Security For The Home. 05 May 2005. 21 April 2011 . Proxim Corporation. WIRELESS NETWORK SECURITY. 2003. 22 April 2011 . Radack, Shirley. SECURITY FOR WIRELESS NETWORKS AND DEVICES. 2011. 19 April 2011 . Turban, Efraim, et al. Information Technology for Management: Transforming Organizations in the Digital Economy . New York: Wiley, 2005. Weber, Chris and Gary Bahadur. Wireless Networking Security. 2011. 19 April 2011 . Wireless-Center. Advantages and Disadvantages of WLANs. 2011. 22 April 2011 . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless Network Security Research Paper Example | Topics and Well Written Essays - 1750 words”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1417041-the-wireless-network-security
(Wireless Network Security Research Paper Example | Topics and Well Written Essays - 1750 Words)
https://studentshare.org/family-consumer-science/1417041-the-wireless-network-security.
“Wireless Network Security Research Paper Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/family-consumer-science/1417041-the-wireless-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless Network Security

Wireless Security Policy

Purpose and Scope The key purpose of Wireless Network Security in a bank is to allow employees freedom of mobility while accessing the network to deliver better customer service without compromising the confidentiality of both the customers' and the organization's information (Goldsmith, 2005).... Since standards for Wireless Network Security emerge and evolve continuously with technological developments, the bank must keep abreast with the changes to avoid being exposed to reputation and strategic risks....
5 Pages (1250 words) Assignment

Detecting rogue access point using Omnipeek software to analyze the wireless network

Various network security systems are in use.... Various network security systems are in use.... As stated by Crothers (2002), the main methods used to detect the attacks on network systems are; Signature based detection Anomaly based detection State full protocol analysis Different network systems have different network security technologies.... The different network security technologies can be classified into four major groups....
21 Pages (5250 words) Essay

Forensic Computing and Identity Theft

Common ID theft crimes and security issues are discussed.... Forensics is the structured procedure of gathering, examining and showing facts and evidences to the court of law, and thus, forensic computing is defined as “the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law” (US-CERT 2008)....
16 Pages (4000 words) Essay

Wireless Deployment Plan

his requires a wireless deployment solution that will address the Wireless Network Security, management, deployment, and control of deployment aspects.... nbsp;… A wireless deployment plan provides an efficient and effective implementation of the wireless network in the institution and provides guidance towards the implementation of the system.... The efficiency is achieved by proper deployment of the wireless network through a wireless deployment plan....
6 Pages (1500 words) Term Paper

Security Risk Mitigation Policies

Wireless Network Security: Vulnerabilities, Threats and Countermeasures.... In the case of the wireless network bridge, there is need for effective management to the threats linked with wireless technology.... In this case, there is a security issues with the wireless network connection as well as physical breach on customer's personal data.... In the case of the wireless network bridge, there is need for effective management to the threats linked with wireless technology....
2 Pages (500 words) Coursework

Common Identity Theft Crimes

Common ID theft crimes and security issues are discussed.... nbsp;Financial crimes mainly take account of the misuse of the victim's credit card information, bank account information, social security number, or insurance information.... This report “Common Identity Theft Crimes” is a discussion about identity theft....
9 Pages (2250 words) Research Paper

Key Distribution Schemes for Wireless Networks

… Wireless Network SecurityKey Distribution SchemesIntroductionWireless network security is critical and they must have sufficient security similar to their wired counterpart.... However, wireless networks security is far more complicated than wired since Wireless Network SecurityKey Distribution SchemesIntroductionWireless network security is critical and they must have sufficient security similar to their wired counterpart.... This paper will discussed the various scheme being proposed by a number of experts in the field of network security such as Self-Healing, Random Key Pre-Distribution Schemes (RKPS) with I-HARPS, and Matrix Threshold Key Pre-Distribution (MTKP) and Polynomial Threshold Key Pre-Distribution (PTKP) that are based on Blom's scheme and secret sharing....
14 Pages (3500 words) Article

Security in Wireless Network

Issues of network security are currently becoming essential as society is in the movement towards the age of digital information.... The emergence of the security protocol as well as IT Governance has played a great role in ensuring network security (Xiao, Shen, X, & Du, 2011).... The system of network security relies on the protection layers and comprises numerous constituents including security software and networking besides appliances and hardware....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us