Paper Title (Use Style: Paper Title) s27

Paper Title (Use Style: Paper Title) s27

<p> International Journal of Electronics, Electrical and Computational System IJEECS ISSN 2348-117X Volume 3, Issue 4 June 2014</p><p>Information security analysis of Wi-Fi networks</p><p>Ms. Shikha Ranjan Mr. R.N.Shukla Ms.Pooja Lohia ECE Department Associate Professor (ECE) Research Scholar (ECE) MMMUT Gorakhpur,India MMMUT Gorakhpur,India MMMUT Gorakhpur,India [email protected] [email protected] [email protected]</p><p>ABSTRACT: - The potential of wireless exchange data and connect to the internet using communications has resulted into a vast 2.4 GHz UHF and 5 GHz SHF radio waves. Wi- expansion of wireless networks. However, the Fi technology now has a total of about 900 vulnerabilities and threats that wireless networks million Wi-Fi users worldwide [2]. Application are subjected to have resulted into higher risk by of the latest wireless technology makes it unauthorized users to access the computer possible to have high performance, low cost networks. The proposed comprehensive wireless network applications. However, Wi-Fi measures are to resolve Wi-Fi network security network access and data transfer processes are based on Wi-Fi network basic security prone to security problems. As wireless access configuration program, and intermediate increases, security becomes an even more security configuration program, and advanced important issue. security configuration program. The aim of this paper is to help Wi-Fi network user to establish III. SECURITY ISSUES OF WI-FI a secure network application platform. NETWORK Wi-Fi has a lot of security vulnerabilities.</p><p>Keywords—WEP; Information Security; Unfortunately these vulnerabilities and the Wireless Fidelity; Access control; Data severity of them became widely known too late. Encryption Wi-Fi access can be divided into two categories:- (i) Authentication, confidentiality, I. INTRODUCTION access control. (ii) Wireless communication network With the wider use of Wi-Fi networks, more Maintenance, Deployment & Design of and more people joined the wireless unique process of attack. network. Wi-Fi networks consist of at least two The complexity of setting up a secure wireless or more entities that communicate without the network increased and the percentage of use of any wires. They follow a standard set of wireless networks that use the best mechanisms rules to achieve their communication and the to enable security is not as high as it should be. standard is known as IEEE 802.11, or just 802.11. The name Wi-Fi comes from the Wi-Fi A. Drawbacks of the WEP encryption Alliance. WI-FI certified equipment, tested and mechanism approved by the Wi-Fi Alliance, bears the Wi-Fi logo. The definition of WEP as specified. It states that WEP is only meant to give Wi-Fi the I. WI-FI NETWORK TECHNICAL same security attributes that are inherent to an OVERVIEW equivalent wired network. Unfortunately, WEP Wi-Fi is a local area wireless does not provide this level of security .WEP was technology that allows an electronic device to meant to provide cryptographic measure to 107 Shikha Ranjan, Mr. R.N.Shukla, Ms.Pooja Lohia International Journal of Electronics, Electrical and Computational System IJEECS ISSN 2348-117X Volume 3, Issue 4 June 2014 prevent eavesdropping of the wireless Application of security technology is an communication. WEP was found to have many effective strategy to eliminate wireless network weaknesses in the end. Encryption algorithms security threats. There are seven main wireless are too simple; WEP is easy to crack keys by network security technologies. someone else. Key management is complex, use WEP keys need to accept an external key A. Wireless signal spectrum expansion management system of control, because of the technology way this process is complex and requires manual operation, so many networks to facilitate Extended frequency technology is a the deployment, use the default WEP key, and technology used for secure transmission of data. allowing hackers to crack the key difficulty is A very low power signal is sent by spread significantly reduced. spectrum is used in a very wide frequency range of launch, and narrow-band radio-on the B. Search for wireless signal attack reverse ; it put all the energy into a single Searching a wireless signal is also a frequency [4]. Some wireless LAN products in method of attacking wireless networks; there are the ISM bands for transmit signals within the many attack and recognition techniques and 2.4~2.483GHz, in the context of this can get 79 software for wireless networks Netstumbler tries isolation of different channels; wireless signals to actively associate with access points. It will are sent to a random sequence on each channel. send out probe requests. Netstumbler has its Many of radio wave frequency transforms per greatest use to engineers surveying their own second, in order to send the wireless signal on Wi-Fi network. Many wireless network is not each channel, and stays fixed time on each using encryption, even if the encryption feature channel, before converting to cover all channels. is used, if the AP broadcast message feature If the time spent is not known on each channel not turn off , AP Radio and still contains a lot of and frequency hopping pattern site to receive information can be used to infer the WEP key and decode the data outside of the system is information in clear text, such as network name, almost impossible. Using different frequency SSID, and other conditions to hackers hopping pattern, dwell time and adjacent to the intrusions. channel number can be no mutual interference between several wireless networks that do not C. Wireless network eavesdropping intersect, so do not worry about data being Revealing threats include eavesdropping, intercepted by other users on the network. interception and monitoring [3]. Tap refers to eavesdropping through a network of computer B.WEP data encryption technology communication in electronic form, it is passive and intrusion detection cannot detect the device. WEP is the most basic wireless Even if the network is not foreign broadcasting IEEE802.11b protocol security encryption network information, if you can find any measures, its main purposes include providing information in clear text, an attacker can still use access control and prevent unauthorized users some of the network tools, such as AiroPeek and from accessing the network [5]. Data encryption TCPDump to monitor and analyze traffic, so as technology is the core with hardware or to identify information that can be overcome. software, before the packet is sent encrypted, only the workstation has the correct key can IV. WI-FI NETWORK decrypt and read the data. This technique is INFORMATION SECURITY commonly used in systems with high demands TECHNOLOGY on data security, such as the network of</p><p>108 Shikha Ranjan, Mr. R.N.Shukla, Ms.Pooja Lohia International Journal of Electronics, Electrical and Computational System IJEECS ISSN 2348-117X Volume 3, Issue 4 June 2014</p><p> commercial or military, to effectively play a role security function; considered antenna on in secret. authorized user and intrusion who of effect; for all user using consistent of authorized rules; C.Network resource access control does not is easily damage of location technology deployment hardware. To prevent intruders from gaining access B. WEP encryption enabling to network Resources are implemented with Enhance wireless network security must a validation algorithm. In this algorithm, the be the correct mechanism for using WEP shared adapter needs to prove that he knows the key authentication to achieve security objectives key. Port access control technologies are and functions; five regard must be taken into used to enhance network security of WLAN consideration. First is by in each frame in the solutions. When after the radio station joined a check and of practices to guarantee data associated with the AP, AP services depends of integrity, prevent some attack in data flow in on the 802.1x of certification of the results. the Insert known text to tries to crack key flow; If the certifications, AP open the logical port second is must in each client and each AP for the user, otherwise, users are not allowed implementation WEP to work; third is does not access to the Internet. 802.1 x additions to using advance defined of WEP key, avoid using the provided port access control capabilities, default options; IV is key by user to set, and to also provides user-base authentication often change; v is to using most solid of WEP system and billing, wireless access solution version, and standard of latest update version is ideal for companies. keep synchronization</p><p>V. WI-FI NETWORKING METHODS A B. Wireless network access point's MAC MEASURES FOR INFORMATION addresses filtering SECURITY A large number of attacks can be According to I-wireless network reduced by MAC address filtering, large- management and maintenance practices to scale wireless networks are a very viable troubleshoot wireless networking security option. First MAC filtering as a first layer of threats, mainly uses the following security protection measures is; the second, should measures. record each MAC address used on the wireless network, and configured on the AP, A. Wi-Fi network information security design allows only those addresses access to the Network security analysis as a whole is network, MAC access prevents non-trusted to conduct a Comprehensive analysis of security network; third, the logging error can be used threats on the network may save. When potential and checked on a regular basis, determine invasive threat is identified, it is to be included whether an attempt to break through the in the network planning, take timely measures, security measures. excluding the wireless network security threats. Select comparison has security guarantee of D. Wireless network protocol filtering products to deployment network and set for of Network security risks can be reduced by network structure is ensure network security of Protocol filtering. In Protocol filters are set premise conditions, while also to do is as correctly on the appropriate protocol filter for follows several points: modified device of wireless networks to provide a security default value; to base station as a RAS; specified guarantee, is quite an effective method filtering dedicated Yu wireless network of IP agreement; Protocol to restrict those who try to access in AP using speed most fast of, and to support of wireless devices through SNMP network users 109 Shikha Ranjan, Mr. R.N.Shukla, Ms.Pooja Lohia International Journal of Electronics, Electrical and Computational System IJEECS ISSN 2348-117X Volume 3, Issue 4 June 2014 to modify the configuration, one can also access point and wireless router support 64-bit prevent the use of large packet ICMP protocol and 128-bit WEP authentication and encryption and other protocols will be used as a denial of to ensure data security in wireless link, service attack. preventing the data from being stolen. At the same time, due to the relatively fixed and E. Shield SSID broadcast information limited the number of end users, manually While RF communication is easily configured WEP key it is quite realistic. On if captured , but from the AP to the outside world you could further cooperate in the AP provides by preventing the SSID broadcast, this access control based on the MAC address will drawback can be overcome .Securely be able to better prevent service be stolen by distributing configuration information to clients other illegal users. that need wireless network users. Closed to traffic throughout the network to avoid invalid B. Intermediate application security program connections can occur at any time. On Wi-Fi network with high security F. IP addresses rational allocation requirements, taking into account the network Assign IP addresses are static and coverage and the number of end users, will dynamic address in two ways, which determine greatly increase the number of AP, and the the wireless networks assign IP methods best wireless card, at the same time as the user more suited to their own institutions, essential for security risks also increase, single WEP can no network security. Static address can prevent longer meet the needs of such users. Middle- hackers to obtain an IP address automatically, level security uses the IEEE802.1x pass restrictions on the network layer access to authentication technology as the wireless the device and dynamic addresses simplifies the network security key, and user authentication use of WLAN, reduce the heavy administrative through the server, effectively preventing work can be reduced. unauthorized access, this programmer is fully intended to be used in such situations, and VI. CASE STUDY OF WI-FI NETWORK provides complete security protection. SECURITY A Wi-Fi network security need are C. Advanced application security scenarios different in different application environments, Network information security is based on accumulated experience, demand for very important for large corporations and all walks of life on the wireless network, has financial institutions. Use 802.1x authentication developed a series of security, maximum mechanism on the basis of the recommended convenient secure wireless network users, save VPN facilities to further improve network unnecessary expenses, better play to the security performance. Many companies already advantages of wireless networks. have VPN access server internal network system, using existing resources will be able to A. Basic security applications quickly and easily meet the security needs of For tiny business and home users alike, using a this part of the user. VPN is now widely used to network of comparatively small and limited protect data transmission security for remote number of end users, basic security programmer access. VPN protocols include layer PPTP/L2TP fully meet their network security needs and low protocol and IPsec protocol layer, therefore, has investment costs, configuration results are a higher network security than WEP Protocol to obvious. Basic security recommendations use support end-to-end security of the tunnel the conventional WEP authentication and between the user and network connections [6]. encryption technology, Wi-Fi AP wireless Another advantage of VPN technology can 110 Shikha Ranjan, Mr. R.N.Shukla, Ms.Pooja Lohia International Journal of Electronics, Electrical and Computational System IJEECS ISSN 2348-117X Volume 3, Issue 4 June 2014 provide users based on RADIUS authentication com/security/securing-business-against- and accounting. war-driving. . [2] Zhao Xin. Global WI-FI users have VI. CONCLUSION reached 700 million, [j]. The people's As an unauthorized user can access Wi-Fi post and telecommunications, 2011 (9) networks, thus there is need to protect the [3] Wu ChengZhi. Discussion on hybrid sensitive information and insure the privacy of optical wireless broadband access the user to protect the important assets. In order network technology, [j]. modern to provide encryption, Wi-Fi networks are transport, (2010) managed and maintained to experience a variety [4] Wu ChengZhi. Discussion on hybrid of network security technology and provide optical wireless broadband access strength to user, prevent the user from sharing network technology, [j]. modern information to outsider and prohibit installation transport, (2010) Information of secrete AP. Thus by proper management and technology education, (2011) maintenance security of Wi-Fi network can be [5] Tan Juan. Campus wireless LAN enhance. security analysis and solutions, [j].Information technology education, References (2011) [1] TechDoc (2008). Securing Business [6] Li Hui. Research and implementation on against War safety of combination of L2TP and Driving.onlineAvailable:http://webupon. IPSec VPN [j]. Modern communications, 2007 (2)</p><p>111 Shikha Ranjan, Mr. R.N.Shukla, Ms.Pooja Lohia</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us