This article discusses the security and ethical issues with WIFI networks, network design solutions, and implementing security systems. It also analyzes network security tools. The article provides study material on wireless network security for students.
Contribute Materials
Your contribution can guide someoneβs learning journey. Share your
documents today.
Contents Introduction.................................................................................................................................................2 Security issues.............................................................................................................................................2 Ethical issues with WIFI Networks.............................................................................................................2 Network design...........................................................................................................................................4 Network Topology Diagram........................................................................................................................9 Analysis of network security tools...............................................................................................................9 Implementing of Security Systems............................................................................................................10 CONCLUSION.............................................................................................................................................12 REFERENCES..............................................................................................................................................13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction In today scenario the wireless network systems are widely used in the industries. Due to its higher growth the threads involved in the wireless network also increases. So there is a need to provide security for the network systems. This can be obtained by following the rules and regulations. This phenomenon was known as wireless security. Here we are going to see about the problem faced by the automobile company on their network system deployment. The wireless network system was the most flexible as well as effective network system. But it has major flaws in its configurations. When compared to wired connection there is no physical control of the users. Here the user access are controlled by the authentication process. Wireless systems also reduce the initial costs. So the drawbacks like authentication problems must to be rectified. That is the only way to make the sustainable systems. The authentication process will be controlled by securing the governing policies. Because the wireless network system there is a possibility to attacked by the attackers. Unless we protect the system by employing the clear authentication process. Here the SQL servers are used to scan the server database. That acts like the server management system. Security issues Nowadays the computing system where becoming portable and smaller in size, so the devices has theft and the data are stolen. The stolen device has may store more data that can protected by security like encryption key. For security purpose the system gives solution as fingerprint recognition, scanning apply to mobile devices. For example the mobile device security improve many biometric security of HP IPAQ Pocket PC. The operating environments have needs for security at the levels of stages when incorporates by applications of security. The investigation have been done in this part. An example to block the file which are accessed by PDA device the system administrator need unblock the access files whether is the credentials are supplied improper. By severe loss of PDA operational have result in the part of environments, that are computerized in memory have wants to erase and disk data, by unsuccessful logins may leads to reset the hard disk. In wireless network system there is no physical security was available like the wired connection. In wired LAN connection the computers are connected by the wires as well as optical fiber cables. They provide the physical security for the data transferred by the computers. But wireless connectivity that uses some kind of waves they are capable of transmitting the data packets. So the wireless network connection authentication 2
process must be very strong and not easily hackable. For this purpose there are many methods are used. But WEP, WPA, WPA 2. Ethical issues with WIFI Networks The open network provides the free connection to use the network that leads to download and browse any information and there is no rules to use GPS devices for protection, In US rules the scanning of node is not illegal. But the information of the robbing service they can attack it [1]. By node scanning have to give the location and access point. The location privacy and access point have issued. In access point the common breaching are used as given below. ο·To browse of adult website and affected network. ο·To access the bank account and theft the currency. ο·For hacking the system for the experience. The access point were setting the duplicate to understand of the scanning in more than two attempts in one day. In Africa the member are trying to use the credit card of the other member there caught by theft of more credit card pin. The ethical issues has cause the access of unauthorized data. For example In US a person has log on the computer by other person without any regulation by an open network. The data or network are accessed without any permission that may leads to robbing. Whether the network has access by unauthorized persons the administrator cannot use the bandwidth for long time. They wants to pay the money for the bandwidth compare to application thatβs leads to gaming. For access the network, user can do anymore. In future the people are becoming the aware of network by this problems. For security the administrator are applying the passwords for each open network. But the now also hacking the internet access and they have many tools to recover the passwords and many website the help the hacker to hacks the passwords like remember password. The user are not configure the system if they donβt allot. The encryption keys have provide many high level security to the user. The authentication have provide mechanism in 802.11. Shared key Authentication:This authentication has process the response to complete and challenge the access point. Open system authentication: This authentication uses the SSID approach, the access can be granted whether it is SSID are not. 3
Centralized authentication: This authentication the server are used. The network can access only in authentication. Network design Here the physical configuration of the different floors of the office was showed. Configuration for 1stFloor 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Configuration for 2ndFloor Configuration 3rdfloor Configuration of 4thfloor Above showed configuration diagram was drawn by the MS Visio software (Microsoft.com, 2016), here the created diagram was enclosed. The developed design contains the information about the devices that are connected with the networks was showed [6] [7] [8]. Logical Design Therationalmodelrepresentsthebasicconstructingblocks,dividedbypurpose,&the configuration [14]. IP Design ο·Define the subnet (based on: rooms, floor, department, or other criteria). 5
ο·For each subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices. ο·The IP addresses should be clearly labelled on the diagram 1172.16.1.0255.255.255.192 2172.16.1.128255.255.255.224 3172.16.2.0255.255.255.192 4172.16.2.128255.255.255.224 5172.16.2.192255.255.255.224 6172.16.2.224255.255.255.224 7172.16.3.0255.255.255.224 8172.16.3.64255.255.255.224 9172.16.3.128255.255.255.224 1 st floor48 port swSwitch Cisco 2960 2nd floor48 port swSwitch Cisco 2960 3 floor48 port sw 4 floor24 port sw Netsim Work Set off IP values are selected for guest users. Table1IP table for Guest users User NameIP AddressSub Net MaskDefault Gateway Guest1192.168.10.1255.255.255.0192.168.10.100 Guest2192.168.10.2255.255.255.0192.168.10.100 Guest3192.168.10.3255.255.255.0192.168.10.100 Guest4192.168.10.4255.255.255.0192.168.10.100 Guest5192.168.10.5255.255.255.0192.168.10.100 Guest6192.168.10.6255.255.255.0192.168.10.100 Guest7192.168.10.7255.255.255.0192.168.10.100 Guest8192.168.10.8255.255.255.0192.168.10.100 6
Guest9192.168.10.9255.255.255.0192.168.10.100 Guest10192.168.10.10255.255.255.0192.168.10.100 IP Values for Guest users are showed in the above table. Table2IP Table for Normal Users User NameIP AddressSub Net MaskDefault Gateway User1192.168.10.11255.255.255.0192.168.10.100 User2192.168.10.12255.255.255.0192.168.10.100 User3192.168.10.13255.255.255.0192.168.10.100 User4192.168.10.14255.255.255.0192.168.10.100 User5192.168.10.15255.255.255.0192.168.10.100 User6192.168.10.16255.255.255.0192.168.10.100 User7192.168.10.17255.255.255.0192.168.10.100 User8192.168.10.18255.255.255.0192.168.10.100 User9192.168.10.19255.255.255.0192.168.10.100 User10192.168.10.20255.255.255.0192.168.10.100 User11192.168.10.21255.255.255.0192.168.10.100 User12192.168.10.22255.255.255.0192.168.10.100 User13192.168.10.23255.255.255.0192.168.10.100 User14192.168.10.24255.255.255.0192.168.10.100 User15192.168.10.25255.255.255.0192.168.10.100 User16192.168.10.26255.255.255.0192.168.10.100 User17192.168.10.27255.255.255.0192.168.10.100 User18192.168.10.28255.255.255.0192.168.10.100 User19192.168.10.29255.255.255.0192.168.10.100 User20192.168.10.30255.255.255.0192.168.10.100 User21192.168.10.31255.255.255.0192.168.10.100 User22192.168.10.32255.255.255.0192.168.10.100 User23192.168.10.33255.255.255.0192.168.10.100 User24192.168.10.34255.255.255.0192.168.10.100 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
User25192.168.10.35255.255.255.0192.168.10.100 User26192.168.10.36255.255.255.0192.168.10.100 User27192.168.10.37255.255.255.0192.168.10.100 User28192.168.10.38255.255.255.0192.168.10.100 User29192.168.10.39255.255.255.0192.168.10.100 User30192.168.10.40255.255.255.0192.168.10.100 User31192.168.10.41255.255.255.0192.168.10.100 User32192.168.10.42255.255.255.0192.168.10.100 User33192.168.10.43255.255.255.0192.168.10.100 User34192.168.10.44255.255.255.0192.168.10.100 User35192.168.10.45255.255.255.0192.168.10.100 User36192.168.10.46255.255.255.0192.168.10.100 User37192.168.10.47255.255.255.0192.168.10.100 User38192.168.10.48255.255.255.0192.168.10.100 User39192.168.10.49255.255.255.0192.168.10.100 User40192.168.10.50255.255.255.0192.168.10.100 IP Values for Normal users (Office use) are showed here. Network Topology Diagram 8
Network topology diagram was the graphical representation of the network to be created [3] [7]. That was created with the help of network simulating software [13]. In this project NetSim software was used to create the design of the network and its configuration. Here we can also simulate the performance of the network [4]. Here the file created by the netsim software was enclosed here. Analysis of network security tools In Wi-Fi network system there are many types of security credentials are used. Here we are going to see about those kind of security protocols. Mainly WPA2 as well as RADIUS are used in wireless security system. Here we are going to see about those protocols. WPA2 It is abbreviated as Wifi Protected Access-2. This is the advanced version of WPA. This is commonly used security system in wireless network system. From latter 2006 all the standard wifi devices are use these technology. This technology was used to encrypt the data packets. That provides security to the transmitted data. This technology provides higher security to the data transmitted through the wireless data. This available in two variants. Both techniques are same by the function by differentiated by the purpose. And they are WPA2 Personal, WPA2 Enterprise. It ensures the confidentiality of the network system. If we implemented those system there is no need to worry about the unauthorized users. Because that allows only the authorized users. It works based on the IEEE802.11i standards [10] [11][12]. This gives the highest protection against attackers by make the strong and secure authentication process. The WPA2 personal was used for protect the network system by setting the password. But WPA2 Enterprise was server based verification system. RADIUS It is abbreviated as Remote Authentication Dial In User Service. This technology was established by the Livingston-Enterprises [2] [4]. The main purpose of this technology was to provide security to the wireless network system by creating the strong authentication process. This technology was based on the RFC2866 standard. Here the authenticating process was carried out by this protocol. Each and every users are must register by the administrator. Here the user ID as well as the password was given to the users. If the user canβt give the correct username as well as the password. He canβt able to access the network system. The entered access ID was compared with already registered ID. If both ID matched the access permission 9
was given to the user [9]. This also called as the client server protocol [5]. This technology uses the variety of methods to ensure the proper authentication process, and they are PAP, PPP etc. Implementing of Security Systems. Here the above described two security systems are implemented in the developed wireless network to ensure the safety of the system. Here we are going to see about the how to implement the two protocols. WPA2 The implementation of the WPA2 system was basically done by the four stages. And they are explained below [3]. Stage 1 Checking pre β requirements This the first stage of implementation. That is common for both methods. Here we need to check the pre requirements of the protocol and check the compatibility of the OS. Generally all the latest operating systems are compatible for this protocol. If we use the older software we need to use the support software like patching software, etc. Stage 2 Check Wireless Adapter configurations. Here the OS as well as the wireless adapter must compatible with this protocol. Unless we canβt use this security protocol. If the adapter was internally fixed with the system we need to install the supporting files. Stage 3 Router configuration Then the third step was configure the router. Here we need to check the compatibility of the router. All the latest routers are suited for implement this protocol. 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The above showed figure shows the router configuration setting page. It was looks similar to the above showed image. But it changes with respect to the company. Step 4. Finishing the configuration: This is the last stage of the setup. Here we can able to see the active user details. But we need to keep the password confidentially. That was showed in the below figure . RADIUS In administrator system we need to do the following changes. Step 1: Start -> Administrative-tools -> Internet Authentication Step 2: Check the active directory register to ensure the RADIUS-server. Step 3:Internet-Authentication-Service -> register server Step 4: Radius client folder -> Add New-Client Step 5: Fill the client details Step 6: Press Next 11
Step 7: Additional-Information->Client-Vendor-> Select RADIUS Standard-> Set password Step 8: Press Finish. CONCLUSION At the end of the report the secured wireless network was created. Here the network system was protected by the WPA2 as well as RADIUS protocols. The logical network system was developed as well as simulated by using the netsim software. The different legal issues involved in the wireless network was analyzed. The security protocols are analyzed as well as the implemented in the wireless system. 12
REFERENCES [1]"Wireless",Ethics.csc.ncsu.edu, 2018. [Online]. Available: https://ethics.csc.ncsu.edu/risks/security/wireless/study.php. [Accessed: 31- May- 2018]. [2]"Configuring RADIUS servers",Technet.microsoft.com, 2018. [Online]. Available: https://technet.microsoft.com/en-us/library/cc995218.aspx. [Accessed: 31- May- 2018]. [3]D. Strom, "Tutorial: How to set up WPA2 on your wireless network",Computerworld, 2018. [Online]. Available: https://www.computerworld.com/article/2547129/mobile-wireless/tutorial--how-to-set-up- wpa2-on-your-wireless-network.html. [Accessed: 31- May- 2018]. [4]E. Geier, "Low-cost RADIUS servers for Wi-Fi security",Computerworld, 2018. [Online]. Available: https://www.computerworld.com/article/2492402/wireless-networking/low-cost- radius-servers-for-wi-fi-security.html. [Accessed: 31- May- 2018]. [5]F. Paul Funk, "The expanding role of the RADIUS server",Computerworld, 2018. [Online]. Available: https://www.computerworld.com/article/2574976/security0/the-expanding-role- of-the-radius-server.html. [Accessed: 31- May- 2018]. [6]S. Categories, W. Videos, W. Gallery, 2. Locations, W. #WLPC?, L. Library, H. Works, E. Library, T. Conditions and P. Policy, "Wireless Design Principles and Best Practices | Wireless LAN Professionals",Wireless LAN Professionals, 2018. [Online]. Available: https://www.wlanpros.com/resources/wireless-design-principles-best-practices/. [Accessed: 31- May- 2018]. [7]J. Abraham, "3 WLAN Design Best Practices Essential To Deliver a Better User Experience",Securedgenetworks.com, 2018. [Online]. Available: https://www.securedgenetworks.com/blog/3-wlan-design-best-practices-essential-to-deliver- a-better-user-experience. [Accessed: 31- May- 2018]. [8]"WLAN Design Best Practices And Challenges",Network Computing, 2018. [Online]. Available: https://www.networkcomputing.com/wireless-infrastructure/wlan-design-best- practices-and-challenges/49809405. [Accessed: 31- May- 2018]. [9]"RADIUS Protocol",Docs.oracle.com, 2018. [Online]. Available: https://docs.oracle.com/cd/E70765_01/doc.113/e72005/rp_radius.htm#ICPRP168. [Accessed: 31- May- 2018]. 13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.