Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

Advance Wireless & Satellite

Communication

WLAN SECURITY
ISSUES
Presentation Made By:
Syed Junaid Ali
Course Instructor: Mr. Muhammad
Aamir

Types of Wireless Networks:


a) Wireless Personal Area Networking (WPAN)
WPAN describes an application of wireless technology that is
intended to address usage scenarios that are inherently
personal in nature. The emphasis is on instant connectivity
between devices that manage personal data or which
facilitate data sharing between small groups of individuals

Types of Wireless Networks:


b) Wireless Local Area Networking (WLAN)
WLAN on the other is more focused on organizational
connectivity not unlike wire based LAN connections. The
intent of WLAN technologies is to provide members of
workgroups access to corporate network resources be it
shared data, shared applications or e-mail.

Types of Wireless Networks:


c) Wireless Wide Area Network (WWAN)
WWAN addresses the need to stay connected while traveling
outside this
boundary. Today, cellular technologies enable wireless
computer connectivity either via a cable to a cellular
telephone or through PC Card cellular modems. The need
being addressed by WWAN is the need to stay in touch with
business critical communications while traveling.

WLAN OVERVIEW:
A wireless LAN (WLAN) is analogous to a wired LAN but radio
waves being the transport medium instead of traditional
wired structures. This allows the users to move around in a
limited area while being still connected to the network. Thus,
WLANS combine data connectivity with user mobility, and,
through simplified configuration, enable movable LANs.

WLAN OVERVIEW:

SECURITY OF WLAN
NETWORK
IS THE MAIN CONCERN

Security Issues in Wireless Local Area Networks


(WLAN)
By Dr. Gurjeet Singh
PROBLEM
STATEMENT

Before going AllWireless,


organizations
should
first
understand
how
wireless networks
could be vulnerable
to several types of
intrusion methods.

RESEARCH
OBJECTIVE

This paper deals with this


wireless local area security
technologies and aims to
exhibit their potential for
integrity, availability and
confidentiality. It provides a
thorough analysis of the
most WLAN packet data
services and
technologies, which can
reveal the data in a secure
manner.

RESEARCH
METHODOLG
Y

OPEN
ISSUES/
AREAS

There were four solutions


suggested in response to
the WEP vulnerability
problems. Among those,
IEEE 802.1x (i.e. EAP
based) and Cisco LEAP
will be treated as
similar
solutions
for
analysis
and
testing
purposes.
WEP based configuration
will be implemented in
order to emphasize and
practically demonstrate
the vulnerability in WEP
based security. Various
test results are discussed
and illustrated as follows
a) WEP
Based
Approach
b) LEAP
Based
Approach
c) VPN Based Approach
d) SSL Based Approach

Not Discussed..

Wireless LAN: Security Issues and Solutions


By Rafidah Abdul Hamid
PROBLEM
STATEMENT

RESEARCH
OBJECTIVE

RESEARCH
METHODOLGY

The paper will then


explain how Wired
Equivalent Privacy
(WEP) works, which
is
the
IEEE
802.11b/WiFi
standard
encryption
for
wireless
networking.
The
discussion of WEP
continues
by
examining
its
weaknesses, which
result in it being
much less secured
than
what
was
originally
intended.

This situation leads to


further research regarding
practical
solutions
in
implementing
a
more
secured WLAN. This paper
will also cover the new
standards to improve the
security of WLAN such as
the IEEE 802.1x standard,
which comprises of three
separated sections: Pointto-Point
Protocol
(PPP),
Extensible
Authentication
Protocol (EAP) and 802.1x
itself.

One of the standards is


802.1x
which
was
originally
designed
for
wired Ethernet networks.
This standard is also part
of the 802.11i . The
following
discussion
of
802.1x is divided into three
parts, starting with the
concept of Point-to-Point
Protocol (PPP), followed by
Extensible Authentication
Protocol
(EAP),
and
continues
with
the
understanding of 802.1x
itself.

OPEN
ISSUES/
AREAS

802.11i,
provides
replacement
technology for WEP
security. 802.11i is still
in the development
and
approval
processes.

WLAN Security By Sara Nasre


PROBLEM
STATEMENT

RESEARCH
OBJECTIVE

RESEARCH
METHODOLGY

OPEN
ISSUES/
AREAS

Common Threats:
a) Eavesdropping
b) Unauthorized Access
c) Interference
and
Jamming
d) Physical Threats
This
paper
will
provide
an
overview of the
major
security
risks, threats and
vulnerabilities with
WLAN
systems,
referencing
802.11b.

To combat these risks,


some
protocols
and
mechanisms
needed
to
secure this wireless LAN
protocol.

Countermeasures:
e) Frequency-Hopping
Spread
Spectrum
( FHSS )
f)
Direct-Sequence
Spread
Spectrum
( DSSS )
g) Infrared
h) Narrowband
i)
Encryption
j)
Authentication

The 802.11i protocol


for wireless encryption

Wireless LAN Security Concerns


By Albert Van Lengen
PROBLEM
STATEMENT

RESEARCH
OBJECTIVE

RESEARCH
METHODOLGY

a)
Potential
security
risks
that
an
enterprise can
open itself to if
they do not take
appropriate
precautions before
implementing
this technology.

The purpose of this paper is


to assist IT Managers in the
decision
process
when
implementing a Wireless
Network.

b)
c)
d)

Central
WEP
Key
Distribution
STA Access Control
IP Filtering Firewall
VPN Tunneling

OPEN
ISSUES/
AREAS

Risk
Assessment
before
implementing
new
technologies.

Research Issues in Wireless Networks


By Dr. AK Jain

PROBLEM
STATEMENT

Problem in
managing WLAN
services which
includes
Signal fading,
mobility, data rate
enhancements,
minimizing size and
cost, user security
and (Quality of
service) QoS.

RESEARCH
OBJECTIVE

This paper is intended to


provide the reader with an
overview of the Research
Issues and Challenges in
wireless networks.

RESEARCH
METHODOLGY

a)
b)
c)
d)
e)
f)

OPEN
ISSUES/
AREAS

Signal Fading
Data Rate
Mobility
Power & Energy
Security
QoS
Not Addressed

Conclusion
The wireless local area network provides physical flexibility in
that it does not matter where within the space the user is working
they are still able to use the network.
With a wired network it is necessary to decide where
computers will be used and install the ports there. Often the use of
space changes with time, and then either the space has to be
rewired or long trailing cables are used to get from the computer to
the port.
With a wireless network the performance of the network will
deteriorate as the usage increases but unless there is very high
demand all users will be able to access the network.
The network can reach places that wired networks cannot, this
includes out of doors where up to several hundred meters from
buildings the signal can be reached. Also, it is relatively easy to set
up an access point linked back to the campus network for use in
remote premises.

Thank You

You might also like