This document discusses wireless networks and security, including WLAN sniffing tools, recent wireless technologies, and their real-time applications. It also explores the strengths, weaknesses, and security issues of these technologies.
Contribute Materials
Your contribution can guide someoneβs learning journey. Share your
documents today.
Running head: WIRELESS NETWORKS AND SECURITY Wireless Networks and Security Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1WIRELESS NETWORKS AND SECURITY Table of Contents Part A:............................................................................................................................2 Level of Complexity:.................................................................................................2 Included Features:......................................................................................................2 Comparison of models in functionalities:..................................................................3 Advantages and Disadvantages:.................................................................................3 Summarization of Findings:.......................................................................................4 Part B:.............................................................................................................................4 Most Recent Wireless Technologies:.........................................................................4 Use of these technologies in Real Time:....................................................................4 Strength, Weaknesses and Security issues:................................................................5 Conclusion:................................................................................................................6 References:.....................................................................................................................7
2WIRELESS NETWORKS AND SECURITY Part A: Here the two selected WLAN sniffing tools are the Wireshark and another one is the Wi-Fi Sniffer. Level of Complexity: Considering the level of complexity, it is somehow complex for the normal peoples to use. For the expert peoples who are very good at the networking using Wireshark seems to be easy for them. Eventually the Wireshark is one of the most popular WLAN sniffing tools that is available in the market [1]. The Wireshark is also an open source WLAN sniffing tool. Also, this tool is very easy to navigate. (Figure 1: Installing Wireshark) (Source: Created by the Author) Another WLAN sniffing tool in this case is the Tcpdump which is also an open source type of WLAN sniffing tool [2]. The tcmdump is actually a UNIX packet sniffers. This is a
3WIRELESS NETWORKS AND SECURITY classic type of utility and does not consists any type of graphical user interface. Due to this reason the complexity level of tcpdump is comparatively higher than the Wireshark. All the functionality of the tcpdump is done through command line interface. Included Features: The Wireshark is consisting various of features in terms of WLAN sniffing. The Wireshark is able to identify the structure of different types of networking protocol which is one of the main important features of it. With that the other features of the Wireshark are the: ο·Wireshark is capable of capturing data from wire of a live connection [3]. ο·This live data can be read from various types of networks which includes PPP, Ethernet and IEEE 802.11. ο·Captured data through Wireshark can be browsed via the GUI of it. ο·Wireshark is also capable of capturing the traffics from the VoIP calls. (Figure 2: Capturing Data Packets Using Wireshark) (Source: Created by the Author)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4WIRELESS NETWORKS AND SECURITY The Tcpdump is also an important WLAN sniffing tools with having some important features. The main important features are the: ο·Tcpdump is capable of printing contents of the network packets. ο·Tcpdump is capable of reading packets in two ways. First it can read the packets from a network interface cards and secondly this can read the packets from a saved packet file. ο·Tcpdump can intercept and display communication of some another computer system.
5WIRELESS NETWORKS AND SECURITY (Figure 3: Tcpdump on Windows CLI) (Source: Created by the Author) Comparison of models in functionalities: While model of functionality is compared of the Wireshark with the tcpdump it is determined that the Wireshark is very much similar compared with the tcpdump. The main differences in this case is that the Wireshark is having a graphical user interface while the tcpdump does not have this kind of GUI, instead of it tcpdump uses a CLI [3]. The Wireshark
6WIRELESS NETWORKS AND SECURITY is also dissimilar with the tcpdump in the case of some integrated filtering and sorting options. Wireshark is capable of putting the network interface controller into the mode of promiscuous so that the users of Wireshark can all the traffic visible on the interface of the Wireshark [4]. For the case of tcpdump it is capable of applying the BPF filter for limiting the packets number. The tcpdump is functional within the networks that are having a high volume of traffic and renders output from it. Advantages and Disadvantages: BothoftheWiresharkandtheTcpdumpishavingsomeadvantagesand disadvantages. Here the main advantages of the Wireshark is that it is actually an open sourced product and a free software. With that this is available is multiple of platforms including Windows and UNIX. Also, detailed information can be fetched regarding the packets within a network. The main disadvantages of the Wireshark are it is only capable of gathering the information from the network but no information can be sent to the network [5]. In the case of the Tcpdump the main advantage is that it provides some additional access to attributes of traffic which are just more than the port and the host information. Also, the tcpdumps does not transmits any type of traffic to the network. The main disadvantage of the tcpdump is that it does not have any type of GUI which makes this software harder to handle. Summarization of Findings: Thus from the above discussion it is conformed that the Wireshark is comparatively better than the tcpdump in the sense of WLAN sniffing. Tcpdump is actually a basic type of WLAN sniffing tool and misses many advanced functionality compared with the Wireshark. Also, the tcpdump does not consists any type of graphical user interface which makes handling of this software more challenging.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7WIRELESS NETWORKS AND SECURITY Part B: Most Recent Wireless Technologies: The three most recent wireless technologies are the Radio-Frequency identification, Near Field Communication and the Wi-Fi Direct. Use of these technologies in Real Time: All of the three wireless technologies can be used in the real time applications. For the realtimeapplication,RFIDisverymuchessentialinthelogisticandsupplychain management [6]. RFID tags can be used in this case for tracking the logistics and the supply chain in a real time so the organization can plan their business strategy in a proper way. This RFID is also useful for real time inventory tracking. Inventory of an organization can be tracked in real time wirelessly so that organization can determine when to replenish the stock for a better business efficiency. The NFC or the Near Field Communication is also a very much important wireless technology and currently this is having the real time application on smart cards and in the e- walletsystem.Boththe applicationsare relatedwith thepaymentsystem.TheNFC integrated smart cards can be utilised in real time which offers cash free transaction wirelessly [7]. This type of transaction is actually easy to follow and it is also easier compared with the traditional method of payment. The payment service providers such as the VISA and the MasterCards are providing NFC payment services through their cards. In this case the e-wallet can be also utilised for the payment related services wirelessly. For this system the smartphone need to have the NFC wireless sensors and the users will be able to pay directly through their mobile wirelessly in a real time. The Wi-Fi direct is another important wireless technology which can be used for the real time data transferring among the devices. Through the use of Wi-Fi direct the files can
8WIRELESS NETWORKS AND SECURITY transferred among devices wireless and seamlessly with a high speed [8]. For this two devices need to connect with each other through the Wi-Fi direct and then file can be shared among them on real time basis. There are various of applications which utilises the Wi-Fi direct for the data transfer among various of devices. Strength, Weaknesses and Security issues: The main strength of RFID is that its scanning range is very much high. The main weakness in this case is that RFID faces scanning issues many times regarding metal and water. The security issue in this case is that unauthorised devices are capable of reading and changing the data of RFID tags. The main strength of the NFC is that it is very much versatile. It can be used for various purposes within various industries. The main weakness of the NFC is that it is very much expensive and it restricts the usage of NFC. The main security issue related with the NFC is that hackers can get unauthorised access to the NFC devices to see the stored data within it. The main strength of the Wi-Fi direct is that it provides a faster data transfer rate. The main weakness in this case is that the Wi-Fi direct consumptions a high amount of energy [9]. The security issue related with the Wi-Fi direct is that it uses the WPA security which requires the pin based authentication. Here the pin can be cracked by the Brute Force attack. Conclusion: Thus from this report it can be stated that the RFID wireless technology will be standout among these three technologies. It is stated as the RFID security have better security structure compared with the NFC and the Wi-Fi direct. Also, the RFID is currently used various of sectors while the NFC and the Wi-Fi direct is having some limited applications.
9WIRELESS NETWORKS AND SECURITY This shows the usability of all the three devices thus it can be stated that the RFID will be succeed more in the near future.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10WIRELESS NETWORKS AND SECURITY References: [1] Sanders, Chris.Practical packet analysis: Using Wireshark to solve real-world network problems. No Starch Press, 2017. [2] MartinGarcia, Luis. "TCPdump." (2016). [3]Chappell,Laura.Wireshark101:EssentialSkillsforNetworkAnalysis-Wireshark Solution Series. Laura Chappell University, 2017. [4] Iliofotou, Mario. "Tcpdump filters." (2014). [4] Lamping, Ulf, Richard Sharpe, and Ed Warnicke. "Wireshark Userβs Guide for Wireshark 2.1." (2014). [5] Ndatinya, Vivens, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng, and Yang Xiao. "NetworkforensicsanalysisusingWireshark."InternationalJournalofSecurityand Networks10, no. 2 (2015): 91-106. [6] Amendola, Sara, Rossella Lodato, Sabina Manzari, Cecilia Occhiuzzi, and Gaetano Marrocco. "RFID technology for IoT-based personal healthcare in smart spaces."IEEE Internet of things journal1, no. 2 (2014): 144-152. [7]Coskun,Vedat,BusraOzdenizci,andKeremOk."Thesurveyonnearfield communication."Sensors15, no. 6 (2015): 13348-13405. [8] Duan, Yufeng, Carlo Borgiattino, Claudio Casetti, Carla Fabiana Chiasserini, Paolo Giaccone, Marco Ricca, Fabio Malabocchia, and Maura Turolla. "Wi-Fi Direct multi-group data dissemination for public safety." InWTC 2014; World Telecommunications Congress 2014, pp. 1-6. VDE, 2014.
11WIRELESS NETWORKS AND SECURITY [9] Pyattaev, Alexander, Jiri Hosek, Kerstin Johnsson, Radko Krkos, Mikhail Gerasimenko, PavelMasek,AleksandrOmetovetal."3GPPLTEβAssistedWiβFiβDirect:Trial Implementation of Live D2D Technology."Etri Journal37, no. 5 (2015): 877-887.