Wireless Network Security Analysis

Verified

Added on  2020/04/01

|6
|757
|115
AI Summary
This assignment delves into the realm of wireless network security. It presents two case studies, one focusing on setting up a secure wireless camera system using WPA-2 encryption and static IP addresses, and another exploring the concept of handoff theory in WLANs. The second case study examines client prevalence based on user activity, client persistence over time, the MAC Layer Handoff process, and utilizes the NS2 simulator for performance evaluation.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
[Type the company name]
Report on Security for Wireless Network
User_Name
9/30/2017
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents:
Topic Name Page Number
Case Study 1 3
Introduction 3
Steps need to follow to setup the connection 3
Setup configuration 3
Advantages 4
Disadvantages 4
Case Study 2 4
Introduction 4
Handoff Theory 5
Client prevalence on an Access Point Based on
User
5
Client persistence on Access Point Based on
Time
4
MAC Layer Handoff Process in WLANs 5
Acknowledgement 5
References 5
2
Document Page
Case Study 1:
1. The best possible way to help Raju to setup a secured camera through which he can monitor
using his spare is by securing his house with a wireless security camera for long range
transmission, because by setting up a long range transmission, he can monitor his house at
anytime, anywhere using any Wi-Fi enabled device like Laptop, I phone, I Pad, Android
mobile etc.
2. Steps need to follow[2] to setup the connection are.
a. Determine the computer IP address
b. Connect the Access Point to your network
c. Login to the Access Point
d. Change the default password
e. Configure the AP to Access Point Mode
f. Turn off MIMO signal transmission
g. Connect the camera to your router
h. Set the Camera's wired IP address to static
i. Connect the wireless camera to WiFi
j. Set your wireless IP address to static
k. Finally Test the camera's WiFi connection
3.
4. As the mobile phone is Wi-Fi enabled he can use it anywhere.
5. The different security protocol will be:
a. The Router should be configured with WPA-2[4]
b. User name and password should be unique.
c. SSL certificate need to be created.
6. Advantages:
a. Cost Effective: It is cost effective as we are going to use less number of wires.
b. Setup is reliable: As the setup needs very simple steps to follow it is more reliable.
c. High Scalability: Availability is more due to the use of wireless connection.
d. High mobility: As the system can be connected through any mobile device the mobility is
more.
e. More Secured: The connection is more secured due to the use of security certificate.
3
Document Page
Disadvantages:
a. Fixed Range: Due to the use of wi-fi network the range is fixed.
b. Accessible to fixed range of system
Case Study 2:
Introduction
Shared Key Authentication (SKA) is a process where a computer can get access to a wireless
network that uses the WEP protocol. To start with the connection process the system sends an
authentication request to validate the connection.
Handoff Theory:
Handoff analysis is a process of transferring a mobile station (MS) from one base station (BS)
or channel to another. A handoff occurs [1] when a client moves away from the radio range of
one access point, and into the range of another access point. When a client moves and loses
connectivity to its access point, it starts gathering information by sending the request to the
neighbouring nodes. If neighbouring nodes [2] are not available it keeps checking the higher
signal strength to increase the performance.
Client prevalence on an Access Point Based on User
Client persistence on Access Point Based on Time
4
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
MAC Layer Handoff Process in WLANs[1]
Acknowledgement:
The performance has been evaluated by using NS2 simulator which is an open source and easy
to implement. It can be used in any of the linux platform.
References:
[1] IEEE, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specifications, IEEE Std 802.11-1999, Aug. 1999.
[2] IEEE, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specifications, Amendment 6: Medium Access Control (MAC) Security Enhancements, IEEE
Std 802.11i-2004, July 2004.
[3] M. Rodrig, C. Reis, R. Mahajan, D. Wetherall, and J. Zahorjan, “Measurement-based
characterization of 802.11 in a hotspot setting,” in Proceedings of EWIND, Aug. 2005, pp. 5–
10.
5
Document Page
[4] A. P. Jardosh, K. N. Ramachandran, K. C. Almeroth, and E. M. Belding-Royer,
“Understanding congestion in ieee 802.11b wireless networks,” in Proceedings of IMC, Oct.
2005
6
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]