Design and Implementation of Wireless LAN Security Solution Plan

Verified

Added on  2023/06/10

|15
|3912
|84
AI Summary
This paper discusses the design and implementation of a wireless LAN security solution plan including wireless security, intrusion detection and prevention, authentication, encryption, authorization, and BYOD policy.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
Advanced Diploma of Computer System Technology
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
PART A
Introduction
The main purpose of this paper is to design and implement a wireless LAN which
would be including the wireless security solution along with intrusion detection and
prevention. The design would be consisting a wireless LAN security solution plan where the
user need to authenticate themselves with the organizations Active Directory Domain and
alsong with this the staffs of the organization would be provided with an managed device of
the organization whereas the students would also be encouraged to bring their own electronic
devices. The students would be allowed with a facility of getting connected to the wireless
LAN. The management of the organization would also allow the guest users to get connected
to the network whenever they visit the organization for attending meetings however for the
accessing the network they need not to have an active account Directory account of the
organization.
Topology and deployment Model
A hierarchical design model is used for the development of the wireless network and
the network is divided into core, distribution and access layer. The hierarchical design model
allows each of the layer in the network to perform specific function and simplifies the design.
It can also be used for scaling the network and increasing the consistency of the network. The
management of the hierarchical design model is simple and the faults in the network can
easily isolated and the resiliency can be improved.
The only disadvantage of this model is that the flexibility of the design is poor and if
there is a need for expansion of the network many of the network device needs to be
reconfigured.
Document Page
2ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
RF Plan and Site Survey
This is considered to be one of the most important component for the deployment of
wireless LAN. This real time wireless RF plan would be associated with showing the overall
coverage throughout the campus by making use of the heat map. Along with this a RF plan
tool is also to be used before the deployment of the wireless network takes place so as to map
out the locations which are optimal for the access points that are based upon various factors.
Two major things are to be considered while making the plan. The first and the foremost
component is the obtaining of the proper floor plan of the entire campus. This floor plan
would be a CAD architecture or a JPEG file. In case if it is seen that the map or the plan is
not prepared for the purpose of scaling the RF signatures then it would not be correctly
represented and this would be responsible for incorrect representation along with which the
distance between the devices would also be not represented accurately. All this would be
responsible for miscalculation of the distances between the access point and the devices
which would be initially leading to inaccuracies. Another important component of making a
proper RF plan is the dimensions. it is essential to have the area of the campus which includes
the dimensions, length and width. After considering the dimension the plan is made. The
number of floor along with the distance between the floors is to be determined along with the
number of users and number of users per access point. Some other things that have been
considered includes the following:
Document Page
3ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
ï‚· Radio type(s)
ï‚· Overlap Factor
ï‚· The Desired data rates for the access points
ï‚· Desired monitoring rates for AMs
ï‚· Areas of your building(s) where it is necessary to have coverage
ï‚· Areas of your building(s) where there is no need of deploying an Access point or
cannot be deployed
ï‚· Areas of your building(s) where there is a need of deploying 802.1x Hotspot (Zone)
ï‚· Any area where you want to deploy a fixed AP.
Procurement of Equipment
With the evaluation of the wireless network technology there has been a proliferation
in the offerings made by the manufacturer in terms of the equipment’s as well the tools
related to management. Besides this it is also very important to understand the fact that
different vendors are associated with providing different type of solutions which are having
differences with respect to their technical points. Along with this it is also essential to
consider the architecture provided by the vendor along with considering the hardware,
software and the management tools and how this components meet the requirements and
budget of the organization so it is recommended that the offerings from multiple vendors is to
be sought and combined with the quotations made by the various wireless system integrators.
All this are to be sought so as to provide the results which are the best in accordance to the
needs of the organization.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
Authentication
a. 802.1x EAP
The 802.1x is used for the purpose of funnelling the wireless traffic onto the LANs which
are virtual in nature which would be associated with reflecting the user or the group
permissions. This is also be helpful in the process of knowing the process involved in the
establishment of the critical link between the authentication and the authorization. In this the
packets would be provided with a tag whenever they enter the LA N in order to make sure
that the upstream devices become capable of applying the security or the QoS filters. Besides
this access points might also be capable of tagging the wireless traffic so as to make sure that
this traffic remains totally separated from the other network traffic whenever it moves
through the network. The 802.1x would be requiring a tree party authentication which
involves a supplicant, an authenticator and an authenticating server.
b. Mutual Authentication
Mutual Authentication or the two way authentication would be used where both the
entities who would present in the communication link would be associated with
authenticating each other, which means that the client would be authenticating the server and
the vice versa. By adaptation of this the users of the network would be assured about the fact
that they are allowing the legitimate entities to use the network and the server would also be
certain about the fact that the would-be users are making attempt to join the network for
legitimate purpose.
c. Client Settings
Access to the LAN is not provided by the 802.1x is not provided unless and until the
client is authenticated. The main components that are required to get authenticated in the
802.1x includes the EAP-cable client, 802.1x capable access point, and lastly an EAP Cable
Document Page
5ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
Radius Server.Cisco LEAP 802.1x is to be used here which is a type of WLAN which is
supported by the Wi-Fi WPA and WPA2. This also supports mutual authentication between
the client and the RADIUS server by making use of the logon password. This also provides
dynamic per-user, per-session encryption keys which has the capability of fast securing.
d. User Password Policy
A user password policy is to be implemented which is a set of rule associated with the
enhancement of the security. This policy would be associated with encouraging the users to
make use of strong passwords along with using them in a proper way. Certain components
are included in the password policy which includes the following:
ï‚· Length of the password and formation: A minimum password length is to be used.
The longer passwords are more secure.
ï‚· Password duration: The passwords should be changed periodically.
ï‚· Password blacklist: This would be including the list of passwords which would be
always blocked from usage.
e. Mobility Issues
The mobility issues can occur due to interference and uncontrollable overlapping of
the heterogeneous network. A handoff process is used by the mobile device when the device
goes beyond the coverage area of the access point and some latency is faced due to this and it
can be mitigated with the implementation of the location management. The handoff
mechanism should be configured such that the best access point is selected and the user can
enjoy continuous service. The mobility issues can also occur due to routing inefficiency and
quality of service. The restriction of the bandwidth and low level of reliability can hinder the
performance and the application of optimizing the protocol parameter can also reduce the
performance of the network. There are different mobility management model that can be used
Document Page
6ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
for addressing the issue and connect the mobile agent with the wireless access point for
creating a cross layer coordination.
Encryption
The WPA2 encryption technique is to be used which is the replacement of the security
method for the WPA for the wireless network which would be associated with providing a
stronger data protection and network access control. This is associated with providing the
user with a high level of assurance which makes sure that only the authorized users are
capable of accessing he wireless network, this WPA2 is also associated with providing
government grade security by implication of the NIST or the National Institution of
Standards and Technology FIPS 140-2 compliant advanced encryption standard (AES)
encryption algorithm and 802.1X-based authentication
Authorization
NAC or the Network Access Control is the access control technique which is to be
implemented in order to be sure about the fact that who or what has the authorized permission
to get access to the network. This is associated with including the user as well as the devices.
The NAC woud be associated with the intercepting the requests to the connection which are
then authenticated against a designated identity and access management system. This in turn
would be associated with accepting or denying the access which is generally based upon the
parameters which are predetermined and according the policies that are programmed into the
system. The NAC would be associated with Authorization, authenticating and accounting the
network connections. Confidentiality and the containment of the intellectual property would
be done by enforcement of the policies. Besides this it would also be helping in the
management of the identity and the assets. The NAC would be associated with providing the
guests with an ability to get connected to the network associated with restricted access. NAC
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
continuously monitors the behaviour of the devices connected to the network along with the
collection of logs, flows and packets as well.
RF Threats
There exists various kind of threats and this mainly includes the following:
ï‚· Rough Access Points: This is considered to be a Wireless access point that is installed
in a secure network without an explicit authorization from the local network
administrator weather it is done by the staffs or by any malicious attacker. The
attacker is associated with the installation of an access point which are capable of
running various type of vulnerability scanners which attacks the network remotely.
The wireless intrusion prevention system can be used which is associated with
monitoring the radio spectrum to detect the presence of any kind of unauthorized
access points which would be initially followed by taking of countermeasures
automatically.
ï‚· Active attack is another major risk to the network where it is seen that the hacker is
making attempts to make certain amount of changes in the data present in the target
network or is associated with en routing of the data to the target.
Guest Access Policy
a. Identification of guest authentication methods
There are different methods that can be used for the authentication of the guest and
connect them with the wireless network for enabling them access the different service
provided by the network. The SSID for the wireless network should have a unique name and
it should be connected using a different vlan. The open authentication can be used with the
application of WEP for authenticating with the wireless network. The authenticated key
Document Page
8ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
management is also necessary for increasing the security of the guest network where the user
provides the pre shared key for connecting with the access point and the TKIP and the WEP
algorithm is used for the protection of the communication between the access point and the
client device.
b. Identification of protocols used for guest users
It is important to use an identity management for recording all the details of the guest
connected with the network. The guest can be classified according to the permission provided
to them to access the internal components of the network. The routing policies should be
analysed and the lightweight access point protocol is used for creating a centralized warless
architecture and it should be used for controlling the encapsulation format of data for the
cisco unified wireless network. For the configuration of the network the VLAN are
configured in the switch and it also used for the management of the interfaces and the
network services connected with the VLAN. The switch port mode trunk protocol is also
used for allowing the VLAN for communicating with the other vlan. Different guest access
accounts can be created in the firewall for the management of the network traffic and
blocking the guest to gain the access of the sensitive sites that can cause a negative impact on
the network.
c. Security restrictions applied in the network
The application of network security access control helps in controlling the flow of the
data traffic in the network and secures the network from the external agents to access the
internal resources of the network. The routers should be configured with access control list
such that the guest users can be blocked to access the internal server of the network and
security is maintained. A DMZ zone should be created for the installation of the server and
the physical access of the server to the user should be restricted such that the servers does not
Document Page
9ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
gets infected with spyware or ransomware. The servers can be used by the attacker for
causing denial of service and making the resources unavailable to the intended users
connected in the network.
BYOD policy
BYOD or the Bring Your Own Device is considered to be a mainstay in any of the
organization. This would be associated with allowing the users to get connected to the
network by having their own devices which would be having the potential to wreak the
havocs. This is mainly due to the reason that it is difficult to control it by the IT department.
Along with having the BYOD it is very important to make sure that the employees are honest
about the devices that they are using for the purpose of getting connected to the network,
what applications are on those devices, and what security tools are used to protect them. In is
necessary to integrate the BYOD policy security policy and the acceptable use policy as well.
The structuring of the policies should be done so as to prevent the IT from having
unmanageable number of different type of device.
Conclusion
The entire network would be developed according the requirements of the
organization where the user need to authenticate themselves with the organizations Active
Directory Domain and along with this the staffs of the organization would be provided with
an managed device of the organization whereas the students would also be encouraged to
bring their own electronic devices. The students would be allowed with a facility of getting
connected to the wireless LAN. For doing so the risk are to the identified and the prevention
techniques as well. Encryption is also to be used in the network along with authorization so
as to secure the network. Other policies by user password policy is to be developed along
with the guest user policy. The appropriate encryption and authorization technique has been
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
selected along with this. The BYOD or the Bring Your Own Device policy is also developed
so as to provide a secure access to the guests.
Document Page
11ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
PART B
Demonstration of the network configuration in Cisco Packet Tracer
Document Page
12ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
References
Abdollahzadeh, S., & Navimipour, N. J. (2016). Deployment strategies in the wireless sensor
network: a comprehensive review. Computer Communications, 91, 1-16.
Alsamhi, S. H., & Rajput, N. S. (2016). Implementation of call admission control technique
in HAP for enhanced QoS in wireless network deployment. Telecommunication
Systems, 63(2), 141-151.
Chen, M., Zhang, Y., Hu, L., Taleb, T., & Sheng, Z. (2015). Cloud-based wireless network:
Virtualized, reconfigurable, smart wireless network to enable 5G technologies.
Mobile Networks and Applications, 20(6), 704-712.
da Silva, A. P. R., Martins, M. H., Rocha, B. P., Loureiro, A. A., Ruiz, L. B., & Wong, H. C.
(2005, October). Decentralized intrusion detection in wireless sensor networks. In
Proceedings of the 1st ACM international workshop on Quality of service & security
in wireless and mobile networks (pp. 16-23). ACM.
Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks.
IEEE Communications magazine, 40(10), 70-75.
Hammoudeh, M., Al-Fayez, F., Lloyd, H., Newman, R., Adebisi, B., Bounceur, A., &
Abuarqoub, A. (2017). A wireless sensor network border monitoring system:
Deployment issues and routing protocols. IEEE Sensors Journal, 17(8), 2572-2582.
Khoufi, I., Minet, P., Laouiti, A., & Mahfoudh, S. (2017). Survey of deployment algorithms
in wireless sensor networks: coverage and connectivity issues and challenges.
International Journal of Autonomous and Adaptive Communications Systems, 10(4),
341-390.
Liang, C., & Yu, F. R. (2015). Wireless network virtualization: A survey, some research
issues and challenges. IEEE Communications Surveys & Tutorials, 17(1), 358-380.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
Lin, Y., Li, W., Sun, J., & Wu, Q. (2018, April). Improving wireless devices identification
using gray relationship classifier to enhance wireless network security. In IEEE
INFOCOM 2018-IEEE Conference on Computer Communications Workshops
(INFOCOM WKSHPS). IEEE.
Lu, X., Wang, P., Niyato, D., Kim, D. I., & Han, Z. (2016). Wireless charging technologies:
Fundamentals, standards, and network applications. IEEE Communications Surveys
& Tutorials, 18(2), 1413-1452.
Mahboubi, H., Moezzi, K., Aghdam, A. G., Sayrafian-Pour, K., & Marbukh, V. (2014).
Distributed deployment algorithms for improved coverage in a network of wireless
mobile sensors. IEEE Transactions on Industrial Informatics, 10(1), 163-174.
Mainanwal, V., Gupta, M., & Upadhayay, S. K. (2015, March). A survey on wireless body
area network: Security technology and its design methodology issue. In Innovations
in information, embedded and communication systems (ICIIECS), 2015 international
conference on (pp. 1-5). IEEE.
Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006, February). Security in wireless sensor
networks: issues and challenges. In Advanced Communication Technology, 2006.
ICACT 2006. The 8th International Conference (Vol. 2, pp. 6-pp). IEEE.
Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks.
Communications of the ACM, 47(6), 53-57.
Ramesh, M. V. (2014). Design, development, and deployment of a wireless sensor network
for detection of landslides. Ad Hoc Networks, 13, 2-18.
Sharma, V., Patel, R. B., Bhadauria, H. S., & Prasad, D. (2016). Deployment schemes in
wireless sensor network to achieve blanket coverage in large-scale open area: A
review. Egyptian Informatics Journal, 17(1), 45-56.
Document Page
14ADVANCED DIPLOMA OF COMPUTER SYSTEM TECHNOLOGY
Shaukat, U., Ahmed, E., Anwar, Z., & Xia, F. (2016). Cloudlet deployment in local wireless
networks: Motivation, architectures, applications, and open challenges. Journal of
Network and Computer Applications, 62, 18-40.
Stallings, W. (2017). Cryptography and network security: principles and practice (p. 743).
Upper Saddle River, NJ: Pearson.
Tuna, G., Gungor, V. C., & Gulez, K. (2014). An autonomous wireless sensor network
deployment system using mobile robots for human existence detection in case of
disasters. Ad Hoc Networks, 13, 54-68.
Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005, May). The feasibility of launching and
detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM
international symposium on Mobile ad hoc networking and computing (pp. 46-57).
ACM.
Zhang, Y., & Lee, W. (2000, August). Intrusion detection in wireless ad-hoc networks. In
Proceedings of the 6th annual international conference on Mobile computing and
networking (pp. 275-283). ACM.
Zhou, G., Wu, J., Chen, L., Jiang, G., & Lam, S. K. (2018). Efficient three-stage auction
schemes for cloudlets deployment in wireless access network. Wireless Networks, 1-
15.
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]