ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Wireless Network Security

Verified

Added on  2020/04/29

|9
|1050
|121
AI Summary
This assignment delves into the critical topic of wireless network security. It examines the various threats that wireless networks face, including jamming attacks, Sybil attacks, and data spoofing. The document then explores different security measures and schemes employed to mitigate these threats. These include wormhole-based schemes, random key predistribution, statistical en-route filtering, and TinySec protocol. The assignment concludes by highlighting the importance of robust protocols and schemes in securing wireless networks.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
WIRELESS NETWORK
ROUTING AND SWITCHING

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
WIRELESS NETWORK
Contents
ROUTING AND SWITCHING..........................................................................................4
INTRODUCTION...............................................................................................................4
WIRELESS NETWORK SECURITY................................................................................4
Causes..........................................................................................................................................5
Security Measures........................................................................................................................5
Security Levels............................................................................................................................5
Security Schemes.........................................................................................................................6
CONCLUSION....................................................................................................................9
REFERENCES....................................................................................................................9
Document Page
WIRELESS NETWORK
ROUTING AND SWITCHING
INTRODUCTION
The advancement of technology, consistently, with increasing performance
and decreased prices, accessibility of the internet through wireless is increasingly
deployed in public as well as the office environments. When there are numerous
stakeholders are involved, connecting digitally, it is quite possible to experience
security risks and threats, in the network (EFTA, 2014). Best and secured practices
have become mandatory to deploy in the network, along with the privileges.
WIRELESS NETWORK SECURITY
Wireless network is established through wireless local area network and
wireless communication is established through the Access Point hardware, like
mobile computers, PDAs, etc. connecting the network with no wire. Most of the
networks provide access to the network through open system authentication, with
the 802.11 standard through, a default protocol.
Document Page
WIRELESS NETWORK
Figure: Wireless Network Security (Image from Microsoft Sources)
Wireless security is a process of securing the network to prevent damage or
unauthorized access to the computers. The most frequent and common wireless
security are
1. Wi-Fi Protected Access (WPA)
It can improve the security as a quick alternative. WPA2 is the current
standard. It encrypts the network using a key of 256 bit. Such security is
enforced by certain enterprises, through authentication, based on
certification, for network connection and it uses the 802.1X standard.
2. Wired Equivalent Privacy (WEP)

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WIRELESS NETWORK
It is a weak standard of security as its password can be easily discovered
with certain software tools. It is outdated.
Causes
The causes of more security issues and threats in the wireless networks are
because of the are the weakness of the protocols of the wireless network and
inherent characteristics of the network (Ramin et al, 2014). Eventually, these issues
are to be explored and discovered to counteract, before applying the wireless
network in specific environment, either in office or public spaces.
Security Measures
The primary security measures in wireless network are established by
cryptography, a standard secrecy method, towards protection of the information to
be transmitted, from unauthorized access, by unauthorized users. Various users of
the wireless network need and authenticated for various levels of data and
information. Other measure is an establishment of covert communication, where
the communication existence is concealed, against any possible threats or
adversaries (Boyle et al, 2015).
Security Levels
Security of network can be preserved by providing limited levels of
privileges for access of the data, as the following.
1. Confidential – Sufficient transmission encryption security and authentication
controls attain the encryption needed to provide access to the information
that is confidential. Strong encryption and authentication tunnel can be
provided by using VPN, over the connection of WLAN (Wireless Local
Area Network). Configuration policies and proper key management can
make it more secured.
2. Restricted – it needs higher level of authentication, for more private data.
Document Page
WIRELESS NETWORK
3. Unclassified – This is high level of private data, which is accessed by higher
level of management and authentication. Usually, key business data or
deeper personal data is accessed with this highest authorization level.
Security Schemes
There are various schemes developed for providing the security from
unauthorized access, attacking and hacking the data from the network (HKSAR,
2010).
SCHEM
E
FEATURES DETERRE
D ATTACKES
NETWORK
ARCHITECTURE
Wormhol
e Based
Jamming is
avoided using
wormholes
Jamming or
DoD Attack
For Hybrid senor
network
Random
Key, Radio
Resource
Testing, Pre-
distribution, etc.
Makes use of
ramdom key pre-
distribution, code
attestation, radio
resource, procedure
of registration,
position
verification, for
Sybil entity
detection
Sybil
Attack
Wireless sensor
network, used traditionally
JAM Jammed
region avoidance,
Jamming or
DoD Attacks
Wireless sensor
network used traditionally
Document Page
WIRELESS NETWORK
through coalesced
neighbour nodes
Statistical
En-Route
Filtering
During
process of
forwarding, false
reports are detected
and dropped
Spoofing of
Information
Wireless sensor
networks that are highly
dense and numerous
sensors
TIK Implements
temporal leashes,
According to
symmetric
cryptography,
Needs time
synchronization
accurately
Data or
information
spoofing and
Wormhole attack
Wireless sensor
network used traditionally
Multi-
base and multi-
path station
routing and
bidirectional
verification
Makes use of
multi-base and
multi-path base
station routing and
adopts sharing of
probabilistic secret
Hello flood
attack
Wireless sensor
network used traditionally
On
communication
security
Network
protection, though,
there is
compromise of part
of network,
efficient
Data or
information
spoofing
Wireless sensor
network used tradiationally

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
WIRELESS NETWORK
management of
resources
Random
key
predistribution
Protects the
network, though
there is part of
network is already
compromised,
offers network
resilience and
provides measures
of authentication
for the sensor
nodes
Information
and data spoofing
and attacks in
transit’s
information
Wireless sensor
network used
TinySec Function in
link layer,
concentrates on
message
authenticity
provision,
confidentiality and
integrity
Message
Replay attack and
Information and
data spoofing,
Wireless sensor
network used tradiationally
Table: Schemes for Wireless Sensor Networks Security (HKSAR, 2010)
CONCLUSION
Document Page
WIRELESS NETWORK
Wireless network is widely spread and so widely prone to security threats.
The threats can be mitigated and prevented only through stronger protocols and
schemes.
REFERENCES
1. HKSAR, Wireless Networking Security, (2010), The Government of the
Hong Kong Special Administrative Region, Hong Kong.
2. EFTA, (2014). "SECURITY VULNERABILITIES AND RISKS IN
INDUSTRIAL USAGE OF WIRELESS COMMUNICATION". IEEE ETFA
2014 - 19th IEEE International Conference on Emerging Technology and
Factory Automation
3. Ramin, S., Boulat, B., Dennis, G., Saikat, G., Don, T. (2014). "Covert
Single-hop Communication in a Wireless Network with Distributed
Artificial Noise Generation". arXiv:
4. Boyle, Randall, Panko, Raymond. (2015). Corporate Computer Security.
Upper Saddle River, New Jersey
1 out of 9
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]