Wireless Lan Security Protocols

Wireless Lan Security Protocols

www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10968-10971 A Survey: Wireless Lan Security Protocols Anik Shah, Animesh Shah 12bce084 Computer science, Nirma university. [email protected] 12bce085 Computer science, Nirma university. [email protected] Abstract— As we all know, Wireless Local Area Networks (WLANs), which is based on the IEEE 802.11 standards, is growing at a very considerable rate in the fields of business, schools and other organizations. As WLAN deployments increase, so does the challenge to provide these networks with security. Security can be needed either for the technical issues in the mechanisms, or due to software implementations. This survey paper proposes the use of GSE technique to analyze the shortcomings in the standards specified. After providing with the issues, we will switch focus to the Robust Security Network (RSN) which is proposed in the IEEE 802.11i standard using different GSE models. Index Terms- WLAN Security, Robust Security Network (RSN), IEEE 802.11i, Security, Genetic Software Engineering (GSE), WPA (Wi-Fi Protected Access), Advanced Encryption Standard (AES). propagation of airwaves cannot be blocked or locked in a room, I. INTRODUCTION risk of man-in-the-middle-attacks exists. Wireless Local Area Networks or WLANs are expected to gain Nevertheless, naïve implementation of the security protocol can monopoly over all other wireless products in the market. lead to the same security issues of technical flaws. So, a set of WLANs facilitate us with ubiquitous communications and requirements for the RSN from the IEEE 802.11i standards is location-independent computing in restricted spatial domains formulated. such as offices, factories, hospitals etc. [1] WLANs is famous due to the following desirability : low cost, easy to install, GSE technique [5] is used to analyze the requirements for flexibility, tether-less access to information infrastructure and shortcomings and thus identified ambiguities are resolved using support for ubiquitous computing through station mobility. It appropriate domain expertise to derive at a complete set of also provides advantage of quick installation in an ad-hoc requirements. GSE technique enables systematic modeling of configuration without a supporting backbone network. complex systems with good traceability, control and accommodation of change. [6] The IEEE 802.11i standard proposes a robust security network (RSN) with much improved authentication, authorization and We provide with the requirements, analyses and modeling encryption capabilities. Though these new standards are more details of the WLAN security further in this paper. complicated than their antecedents, they are more secure than existing networks. [2] II. WLAN SECURITY CHARACTERISTICS In the infrastructure topology, wireless stations or STAs In this subsection we will discuss the WLAN characteristics communicate wirelessly to a network access point (AP) which those are pertinent to security protocols design. forms the WLAN. [3] Roaming: It is the ability to deliver services to There are a lot of problems regarding the security of WLANs wireless stations outside of the basic service area. like using Radio Frequency as a medium of transmitting When a wireless station is roaming, new information and the fact that all messages are broadcasted to authentication through the wireless medium must be wherever the coverage of that WLAN can reach. [4] As the performed to ensure the new origination of Anik Shah, IJECS Volume 4 Issue 3 March, 2015 Page No.10968-10971 Page 10968 communication and the new session key from be compatible with a security policy issued by the unauthorized access and use. organization's management to achieve best results. The security policy defines who are alleged wireless users, wireless user's Reduce power Consumption: Since the WLANs are responsibilities, network security administrator's intended for portable battery operated wireless responsibilities, what to be done in the case of security stations, low power consumption is a very important violations and general guidelines in implementing and factor to be taken into consideration. Therefore, the maintaining WLAN security. Such security policies are to be security mechanisms developed should use relatively adhered and enforced in order to be effective. low complex cryptographic algorithms. IV. WLAN SECURITY ATTACKS Limited Bandwidth: The limited ISM frequency band allocated by the FCC and the requirement to use Data transfer through WLANs can be affected adversely by spread spectrum communication limit the data rate. many security threats and attacks. They can be broadly divided This characteristic will require security protocol into two types: Logical attacks and Physical attacks. design that reduces the number of messages exchanged over the wireless medium. Logical Attacks: Noisy Channel: In WLANs, the bit error rate is high Attacks on WEP: Web Equivalent Privacy (WEP) is a relatively to wired transmission medium. This protocol based on encryption algorithm known as characteristic will describe security protocols that RC4. It aims to provide security to the WLAN similar incorporate appropriate provisions for erroneous to the one provided in wired LAN. [4] It still has messages and retransmission procedures. major drawbacks as the encrypted messages can be easily retrieved using publicly available tools. III. WLAN SECURITY STANDARDS MAC Address Spoofing: MAC addresses are sent in The evolution of today’s WLAN security standards begins with the clear when communication between STAs and AP 802.11. This standard helped launch practical WLANs that takes place with integrity. Integrity means to preserve were ideal for the home and most small offices, but lacking in the accuracy of information transmitted between STAs features required by the large enterprise. Authentication was and AP [10]. Since addresses are sent in the clear, an essentially ignored by the standard. attacker can obtain the address of authorized station by sniffing airwaves using tools like ethereal and The data privacy solution was WEP. It is an implementation of kismet and can thus spoof them. [11] This is a major the RC4 algorithm. The RC4 encryption technique is strong security violation. enough, but a weak implementation in 802.11 meant it was only strong enough to protect against casual eavesdropping. In Denial of Service Attack: DoS is a serious threat on addition, the proliferation of readily available hacking tools led both kinds of networks, which aims to disable the to WEP being generally discredited for enterprise wide availability of the network and its services. [10] Little distributed processing environments [7]. is done so far to counteract DoS attacks. IEEE 802.11i and WPA2 are future WLAN standards Man-in-the-Middle Attack: This is a famous attack in introduced by the IEEE and Wi-Fi Alliance respectively. The both wired and wireless networks. An illicit STA new features in 802.11i/WPA2 are AES (Advanced Encryption intercepts the communication between legitimate Standard), message integrity, and fast-roaming support (pre- STAs and the AP. The illegal STA fools the AP and authentication). Vendor interoperability, as well as forward and pretends to be a legitimate STA; on the other hand, it backward compatibility, has been consistent themes for the also fools the other end STA and pretends to be IEEE and Wi-Fi Alliance as WLAN standards have evolved trusted AP. Using techniques like IEEE802.1x to [8]. achieve mutual authentication between APs and STAs as well as adopting an intelligent wireless Intrusion Because of the shortcoming of security technologies in Detection System can help in preventing such attacks. IEEE802.11, Wi-Fi Alliance released a new security standard for the industry called "Wi-Fi Protected Access" (WPA). WPA Bad Network Design: WLANs function as an added two more technologies, namely, IEEE802.1x to improve extension to the wired LAN and hence the security of authentication and TKIP for privacy and integrity of the LAN depends highly on the security of the WLAN. information. The vulnerability of WLANs means that the wired LAN is directly on risk. Also dedicating specific subnets Recently IEEE published a new security standard for WLANs, for WLAN than the once used for wired LAN could the new standard is IEEE802.11i [9], the new standard provides help in limiting security breaches. Careful wired and enhancements of the security shortcomings of WEP and it wireless LAN network design plays an important role to comprises all security technologies in WPA. secure access to the WLAN. In addition to that, IEEE802.11i adopts recently certified encryption algorithm called the "Advanced Encryption Standard" (AES). Default AP configuration: Service Set Identifier (SSID) is the name given to a certain WLAN and it is announced by the AP, the knowledge of SSID is The usage of security technologies to discover and fix security important and works like the first security defense. holes and to maintain security in a WLAN environment has to Anik Shah, IJECS Volume 4 Issue 3 March, 2015 Page No.10968-10971 Page 10969 Some APs don't disable SSID request, in fact the SSID building can receive such signals and launch attacks request is enabled but the SSID name itself is on the WLAN. This kind of attack is known as "war broadcasted in the air. This is another security problem driving" [13]. because it advertises the existence of the WLAN.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us