Abstract
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used to find them are mobile and easy to access. Securing wireless networks can be difficult because these networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to compromise it. In recent years, a range of technologies and mechanisms have helped makes networking more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related authentication, confidentiality and integrity problems. It discovered that strength of each solution depends on how well the encryption, authentication and integrity techniques work. The work suggested using a Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth comparative analysis of each of the security mechanisms is driven by review of related work in WLAN security solutions.
Highlights
Wireless network has gained wide deployment due to numerous benefits such as user mobility, rapid and cheap installation, flexibility, scalability, and increased productivity it offers. Rapid advances in this technology with improved capabilities which is seen in third generation (3G) and fourth generation (4G) wireless devices make it attractive for enterprise to run their business. The use of this novel technology does not go without security risk. 802.11 network referred to as WLAN is challenged by lack of physical protection in the medium
Traditional WLAN that relies on wired equivalent protocol (WEP) has security flaws that were revealed in FMS attack (2001), Korek attack (2004), PTW attack (2007), and ChopChop attack (2008), [1]
This paper evaluated alternative security mechanisms for WLAN; 802.1X and 802.11i, Virtual Private Networks (VPN), IPSec, and Secure Socket Layer (SSL)
Summary
Wireless network has gained wide deployment due to numerous benefits such as user mobility, rapid and cheap installation, flexibility, scalability, and increased productivity it offers. The availability of more secured security solutions and security deployment best practises has greatly addressed security issues of the legacy protocols. This has made many wireless deployments to be probably more secure than the wired LAN. Solid grounding in enhanced WLAN security concepts and technologies solutions at a glance It will allow the network administrator to fully assess the risks associated with using wireless and how to mitigate the risks. The discussion is focused on their operations, performance impact, limitations, possible attacks on them and recommendation of biometric integration on the solution and best practices for addressing threats to WLAN. Readers are encouraged to tailor the solutions and recommended guidelines to meet their specific security and business requirements
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Network Security & Its Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.