SlideShare a Scribd company logo
International Journal of Trend in
International Open Access Journal
ISSN No: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Attacks and Risks i
A. C.
Department of BCA & MSC.SS, Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India
ABSTRACT
Wireless networks are mostly common and are the
part of every organisation or an individual. In this
article we look into the technology of wireless
network and security features of WLANs, delinquent
and attacks in IEEE 802.11 WLANs. There are
variety of attack methods that can be used against the
uses of wireless networks. Modern wireless data
network use a variety of techniques to provide
obstacles to such attacks. This article also discuss the
risks of wireless security in an enterprise. We
conclude that combined effort of users, employers and
system administrator is required to fight against such
malevolent activities.
Keyword: Network security, risk, WEP key
INTRODUCTION
Wireless networks became part of every
organisation’s activity with increase in the use of the
internet, it becomes important to keep
communications like e-mail, e-commerce transactions
and data transmission secure. The reasons are very
clear, as wireless technologies comes with huge
advantage of being costless, easy to fix up and totally
mobile. The use of wireless communication has been
around since 1990’s mostly used in patented. The
obstacles to wireless communication during 90’s were
many, but these barriers are resolved in these days.
There is a huge growth to the use of wireless
technology especially in private sectors. The strong
advantages of wireless technologies it becomes
obvious that business wants to build such a
technology. It seems that there are many variety of
wireless network technologies in the market, but the
one which outstands is WLAN based on 802.11 then
we exploit the weaknesses of wireless networks and
list the various types of attacks possible on them[1].
International Journal of Trend in Scientific Research and Development (IJTSRD)
International Open Access Journal | www.ijtsrd.com
ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
and Risks in Wireless Network Security
C. Sountharraj1
, B. VeeraPandiyan2
1
Assistant Professor, 2
Student
Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India
Wireless networks are mostly common and are the
part of every organisation or an individual. In this
article we look into the technology of wireless
network and security features of WLANs, delinquent
EE 802.11 WLANs. There are
variety of attack methods that can be used against the
uses of wireless networks. Modern wireless data
network use a variety of techniques to provide
obstacles to such attacks. This article also discuss the
rity in an enterprise. We
conclude that combined effort of users, employers and
system administrator is required to fight against such
Network security, risk, WEP key
Wireless networks became part of every
organisation’s activity with increase in the use of the
internet, it becomes important to keep
commerce transactions
and data transmission secure. The reasons are very
clear, as wireless technologies comes with huge
of being costless, easy to fix up and totally
mobile. The use of wireless communication has been
around since 1990’s mostly used in patented. The
obstacles to wireless communication during 90’s were
many, but these barriers are resolved in these days.
e is a huge growth to the use of wireless
technology especially in private sectors. The strong
advantages of wireless technologies it becomes
obvious that business wants to build such a
technology. It seems that there are many variety of
echnologies in the market, but the
one which outstands is WLAN based on 802.11 then
we exploit the weaknesses of wireless networks and
list the various types of attacks possible on them[1].
TECHNOLOGY OF WIRELES NETWORK:
Wireless communication technology
alternative to traditional wire networking where wired
networks relay on cables to connect digital devices
together, wireless networks relay on wireless
technologies. Wireless technologies are widely used
in both home and business computer net
cost device is the foremost reason for wireless
technology in acquisition popularity. But such low
cost equipment’s also facilitates attackers to deploy an
attack. And these arrives need to have a secure and
well established wireless network in
VULNERABILITIES OF WIRELESS
NETWORK:
Vulnerabilities are common for both wired and
wireless networks. The attacks on wireless networks
that exploit the “over air” characteristics of the
wireless signals use the eavesdropping and MITM
attacks
Research and Development (IJTSRD)
www.ijtsrd.com
6 | Sep – Oct 2018
Oct 2018 Page: 930
n Wireless Network Security
Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India
TECHNOLOGY OF WIRELES NETWORK:
Wireless communication technology is a modern
alternative to traditional wire networking where wired
networks relay on cables to connect digital devices
together, wireless networks relay on wireless
technologies. Wireless technologies are widely used
in both home and business computer networks. Low
cost device is the foremost reason for wireless
technology in acquisition popularity. But such low
cost equipment’s also facilitates attackers to deploy an
attack. And these arrives need to have a secure and
well established wireless network in an enterprise.
VULNERABILITIES OF WIRELESS
Vulnerabilities are common for both wired and
wireless networks. The attacks on wireless networks
that exploit the “over air” characteristics of the
wireless signals use the eavesdropping and MITM
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Eavesdropping:
Eavesdropping can be described as accidently over
hearing a conversation and thus gaining important
information which is not easily available.
MITM attacks:
It is known as MAN-IN-THE-MIDDLE attack. The
MITM attack is one step beyond the Eavesdropping
attack[2]. This is an attack where the person secretly
relays and possibly alters the communication between
two parties who believe they are directly
communicates with each other.
In addition there is the possibility to acquire
unauthorized wireless access from a wireless service
point. The techniques that can be used are as follows:
Rogue Access Points
Rogue Clients
Open Access Points
WEP Key Attacks
Jamming
High Gain Antennas
Rogue Access Points:
A Rogue Access Points that has been installed on a
secure network without explicit authorization from a
local network administrator, whether added by a
employee or by an attacker.
Rogue Clients:
Enough client is a client that doesn’t belong to your
company but it is operating on your network anyway.
Open Access Point:
An Access Point is a device such as a wireless
that permits wireless devices to connect to a network.
WEP Key Attacks:
WIRED EQIVALENT PRIVACY is a security
algorithm for IEEE 802.11 wireless network
Jamming:
Jamming attacks are saviour denial -
attacks against wireless median
High Gain Antennas:
A High Gain Antenna is an antenna with a narrow
radio beam that is used to increase signal strength.
SECURITY FEARURES OF WLAN’s
The major security services for IEEE802.11 are
provided by wired equivalent privacy protocol. As per
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Eavesdropping can be described as accidently over
hearing a conversation and thus gaining important
information which is not easily available.
MIDDLE attack. The
yond the Eavesdropping
attack[2]. This is an attack where the person secretly
relays and possibly alters the communication between
two parties who believe they are directly
In addition there is the possibility to acquire
thorized wireless access from a wireless service
point. The techniques that can be used are as follows:
been installed on a
secure network without explicit authorization from a
local network administrator, whether added by a
Enough client is a client that doesn’t belong to your
etwork anyway.
An Access Point is a device such as a wireless router
permits wireless devices to connect to a network.
WIRED EQIVALENT PRIVACY is a security
algorithm for IEEE 802.11 wireless network
- of - service
A High Gain Antenna is an antenna with a narrow
radio beam that is used to increase signal strength.
SECURITY FEARURES OF WLAN’s
The major security services for IEEE802.11 are
provided by wired equivalent privacy protocol. As per
the IEEE standards there are three basic security
features described for wireless networks. They are
Authentication
Confidentiality
Integrity.
Authentication:
A primary goal of WEP (
PRIVACY) was to provide a security service to check
the ID of communicative clients stations. This gives
access control to the network by avoiding access to
the client station that cannot authenticate
Confidentiality:
Confidentiality, or Privacy, was a second goal of
WEP the intent was to prevent information
compromise from causal eavesdropping.
Integrity:
Another goal of WEP was a security service created
to ensure that messages are not mod
wireless clients and access the point in an active
attack.
THE RISKS OF WIRELESS SECURITY IN AN
ENTERPRISE:
For an enterprise there is lot more than just protecting
the network from various attacks. There are different
measures enterprise can take, in order to secure their
network and the most important one is to keep their
wireless access points as safe as possible. The
Important reason to keep access points safe is that the
attackers do not require specific packing tools as the
system itself finds the network when it comes in the
range. One of the major risks for an enterprise from
their own naïve employees the can contact company
databases from a browser and they do the same when
the want to work at home. The attackers can take
advantages of this and instead of breaking into the
security system they would observer the activities of
employees and given a chance would get enough
knowledge that they can then trick themselves as
sincere uses of the enterprise.
Conclusion:
Wireless network security faces a number of hurdles
and efforts are being put on, but are relatively new
and thus not fully developed. Since wireless
technology has huge market but has become almost
inexpensive. It is gaining popularity in all sorts of
business. These strength of the system security is
always countered by its weakest component. So the
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 931
the IEEE standards there are three basic security
features described for wireless networks. They are
WEP (WIRED EQIVALENT
PRIVACY) was to provide a security service to check
the ID of communicative clients stations. This gives
access control to the network by avoiding access to
the client station that cannot authenticate properly.
Confidentiality, or Privacy, was a second goal of
WEP the intent was to prevent information
compromise from causal eavesdropping.
Another goal of WEP was a security service created
to ensure that messages are not modified in transit
wireless clients and access the point in an active
THE RISKS OF WIRELESS SECURITY IN AN
For an enterprise there is lot more than just protecting
the network from various attacks. There are different
can take, in order to secure their
network and the most important one is to keep their
wireless access points as safe as possible. The
Important reason to keep access points safe is that the
attackers do not require specific packing tools as the
self finds the network when it comes in the
range. One of the major risks for an enterprise from
their own naïve employees the can contact company
databases from a browser and they do the same when
the want to work at home. The attackers can take
s of this and instead of breaking into the
security system they would observer the activities of
employees and given a chance would get enough
knowledge that they can then trick themselves as
curity faces a number of hurdles
and efforts are being put on, but are relatively new
and thus not fully developed. Since wireless
technology has huge market but has become almost
inexpensive. It is gaining popularity in all sorts of
th of the system security is
always countered by its weakest component. So the
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
end-users must be given proper training on how to
secure the data when they are at home or at the private
sectors. So that the combined effort of users,
employers and system administrators against such
malicious activities. Appropriate counter measures
can help the organisation to minimise the risk of
illegal penetration.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
users must be given proper training on how to
secure the data when they are at home or at the private
sectors. So that the combined effort of users,
inistrators against such
malicious activities. Appropriate counter measures
can help the organisation to minimise the risk of
REFERENCES:
1. https://www.researchgate.net/...A.../Wireless
Network-Security-A-filed-
2. https://epdf.tips/handbook-
networks-applications-technology
st.html
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 932
https://www.researchgate.net/...A.../Wireless-
-Study
-of-wireless-local-area-
technology-security-and-

More Related Content

PDF
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
DOC
Ichci13 submission 104 (1)
PDF
A Literature Survey on Security Management Policies used in Wireless Domain
PDF
Comprehensive survey of possible
PDF
PPTX
Privacy and security in IoT
PPTX
SmartSecuritySolution_for_IoT
PPTX
Iot(security)
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
Ichci13 submission 104 (1)
A Literature Survey on Security Management Policies used in Wireless Domain
Comprehensive survey of possible
Privacy and security in IoT
SmartSecuritySolution_for_IoT
Iot(security)

What's hot (18)

PDF
Protecting Americas Next Generation Networks
PDF
Wireless Networks Security in Jordan: A Field Study
PDF
IRJET- Research Paper Firewall- Prevent Unauthorized Users
PDF
Internet of Things IoT Security Perspective
PDF
Security 2 Q 07[1]
PDF
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
PPTX
Ch 04 wireless security
PDF
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
DOC
Fitsum R. Lakew Wireless Network Security Threat
PDF
A Review of IP and MAC Address Filtering in Wireless Network Security
PPTX
IoT Security Briefing FBI 07 23-2017 final
PDF
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
PDF
Security Models in Cellular Wireless Networks
PPTX
Cyber security
PDF
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PDF
Plugging Network Security Holes Using NetFlow
PDF
IOT Security
Protecting Americas Next Generation Networks
Wireless Networks Security in Jordan: A Field Study
IRJET- Research Paper Firewall- Prevent Unauthorized Users
Internet of Things IoT Security Perspective
Security 2 Q 07[1]
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
Ch 04 wireless security
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Fitsum R. Lakew Wireless Network Security Threat
A Review of IP and MAC Address Filtering in Wireless Network Security
IoT Security Briefing FBI 07 23-2017 final
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Security Models in Cellular Wireless Networks
Cyber security
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
Ryan Wilson - ryanwilson.com - IoT Security
Plugging Network Security Holes Using NetFlow
IOT Security
Ad

Similar to Attacks and Risks in Wireless Network Security (20)

DOCX
1Table of Contents.docx
PPTX
A Survey On Wireless security
PDF
A Literature Review Of Security Threats To Wireless Networks
PDF
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
DOCX
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
PDF
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODSWIRELESS COMMUNICA...
PDF
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
PPT
chapter 7 -wireless network security.ppt
PDF
A Review Of IP And MAC Address Filtering In Wireless Network Security
PDF
an overview of wireless local area networks and security system
PDF
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
PDF
Wireless Networks Security in Jordan: A Field Study
PDF
Wireless Security Needs For Enterprises
DOCX
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
DOC
Wireless network security threats countermeasure
PDF
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
PDF
Security Technique and Congestion Avoidance in Mesh Network
PDF
Analysis Of Security In Wireless Network
PDF
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
1Table of Contents.docx
A Survey On Wireless security
A Literature Review Of Security Threats To Wireless Networks
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODSWIRELESS COMMUNICA...
WIRELESS COMMUNICATION SECURITY AND IT’S PROTECTION METHODS
chapter 7 -wireless network security.ppt
A Review Of IP And MAC Address Filtering In Wireless Network Security
an overview of wireless local area networks and security system
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
Wireless Networks Security in Jordan: A Field Study
Wireless Security Needs For Enterprises
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Wireless network security threats countermeasure
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
Security Technique and Congestion Avoidance in Mesh Network
Analysis Of Security In Wireless Network
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Ad

More from ijtsrd (20)

PDF
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
PDF
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
PDF
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
PDF
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
PDF
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
PDF
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
PDF
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
PDF
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
PDF
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
PDF
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
PDF
Automatic Accident Detection and Emergency Alert System using IoT
PDF
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
PDF
The Role of Media in Tribal Health and Educational Progress of Odisha
PDF
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
PDF
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
PDF
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
PDF
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Vitiligo Treated Homoeopathically A Case Report
PDF
Uterine Fibroids Homoeopathic Perspectives
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
Automatic Accident Detection and Emergency Alert System using IoT
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
The Role of Media in Tribal Health and Educational Progress of Odisha
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
Uterine Fibroids Homoeopathic Perspectives

Recently uploaded (20)

PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Cell Types and Its function , kingdom of life
PDF
Classroom Observation Tools for Teachers
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Institutional Correction lecture only . . .
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Microbial disease of the cardiovascular and lymphatic systems
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
O7-L3 Supply Chain Operations - ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
01-Introduction-to-Information-Management.pdf
Computing-Curriculum for Schools in Ghana
Module 4: Burden of Disease Tutorial Slides S2 2025
Cell Types and Its function , kingdom of life
Classroom Observation Tools for Teachers
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Final Presentation General Medicine 03-08-2024.pptx
Basic Mud Logging Guide for educational purpose
Anesthesia in Laparoscopic Surgery in India
Institutional Correction lecture only . . .
2.FourierTransform-ShortQuestionswithAnswers.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Microbial diseases, their pathogenesis and prophylaxis
Microbial disease of the cardiovascular and lymphatic systems

Attacks and Risks in Wireless Network Security

  • 1. International Journal of Trend in International Open Access Journal ISSN No: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Attacks and Risks i A. C. Department of BCA & MSC.SS, Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India ABSTRACT Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. Keyword: Network security, risk, WEP key INTRODUCTION Wireless networks became part of every organisation’s activity with increase in the use of the internet, it becomes important to keep communications like e-mail, e-commerce transactions and data transmission secure. The reasons are very clear, as wireless technologies comes with huge advantage of being costless, easy to fix up and totally mobile. The use of wireless communication has been around since 1990’s mostly used in patented. The obstacles to wireless communication during 90’s were many, but these barriers are resolved in these days. There is a huge growth to the use of wireless technology especially in private sectors. The strong advantages of wireless technologies it becomes obvious that business wants to build such a technology. It seems that there are many variety of wireless network technologies in the market, but the one which outstands is WLAN based on 802.11 then we exploit the weaknesses of wireless networks and list the various types of attacks possible on them[1]. International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal | www.ijtsrd.com ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 and Risks in Wireless Network Security C. Sountharraj1 , B. VeeraPandiyan2 1 Assistant Professor, 2 Student Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent EE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the rity in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such Network security, risk, WEP key Wireless networks became part of every organisation’s activity with increase in the use of the internet, it becomes important to keep commerce transactions and data transmission secure. The reasons are very clear, as wireless technologies comes with huge of being costless, easy to fix up and totally mobile. The use of wireless communication has been around since 1990’s mostly used in patented. The obstacles to wireless communication during 90’s were many, but these barriers are resolved in these days. e is a huge growth to the use of wireless technology especially in private sectors. The strong advantages of wireless technologies it becomes obvious that business wants to build such a technology. It seems that there are many variety of echnologies in the market, but the one which outstands is WLAN based on 802.11 then we exploit the weaknesses of wireless networks and list the various types of attacks possible on them[1]. TECHNOLOGY OF WIRELES NETWORK: Wireless communication technology alternative to traditional wire networking where wired networks relay on cables to connect digital devices together, wireless networks relay on wireless technologies. Wireless technologies are widely used in both home and business computer net cost device is the foremost reason for wireless technology in acquisition popularity. But such low cost equipment’s also facilitates attackers to deploy an attack. And these arrives need to have a secure and well established wireless network in VULNERABILITIES OF WIRELESS NETWORK: Vulnerabilities are common for both wired and wireless networks. The attacks on wireless networks that exploit the “over air” characteristics of the wireless signals use the eavesdropping and MITM attacks Research and Development (IJTSRD) www.ijtsrd.com 6 | Sep – Oct 2018 Oct 2018 Page: 930 n Wireless Network Security Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India TECHNOLOGY OF WIRELES NETWORK: Wireless communication technology is a modern alternative to traditional wire networking where wired networks relay on cables to connect digital devices together, wireless networks relay on wireless technologies. Wireless technologies are widely used in both home and business computer networks. Low cost device is the foremost reason for wireless technology in acquisition popularity. But such low cost equipment’s also facilitates attackers to deploy an attack. And these arrives need to have a secure and well established wireless network in an enterprise. VULNERABILITIES OF WIRELESS Vulnerabilities are common for both wired and wireless networks. The attacks on wireless networks that exploit the “over air” characteristics of the wireless signals use the eavesdropping and MITM
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Eavesdropping: Eavesdropping can be described as accidently over hearing a conversation and thus gaining important information which is not easily available. MITM attacks: It is known as MAN-IN-THE-MIDDLE attack. The MITM attack is one step beyond the Eavesdropping attack[2]. This is an attack where the person secretly relays and possibly alters the communication between two parties who believe they are directly communicates with each other. In addition there is the possibility to acquire unauthorized wireless access from a wireless service point. The techniques that can be used are as follows: Rogue Access Points Rogue Clients Open Access Points WEP Key Attacks Jamming High Gain Antennas Rogue Access Points: A Rogue Access Points that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a employee or by an attacker. Rogue Clients: Enough client is a client that doesn’t belong to your company but it is operating on your network anyway. Open Access Point: An Access Point is a device such as a wireless that permits wireless devices to connect to a network. WEP Key Attacks: WIRED EQIVALENT PRIVACY is a security algorithm for IEEE 802.11 wireless network Jamming: Jamming attacks are saviour denial - attacks against wireless median High Gain Antennas: A High Gain Antenna is an antenna with a narrow radio beam that is used to increase signal strength. SECURITY FEARURES OF WLAN’s The major security services for IEEE802.11 are provided by wired equivalent privacy protocol. As per International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Eavesdropping can be described as accidently over hearing a conversation and thus gaining important information which is not easily available. MIDDLE attack. The yond the Eavesdropping attack[2]. This is an attack where the person secretly relays and possibly alters the communication between two parties who believe they are directly In addition there is the possibility to acquire thorized wireless access from a wireless service point. The techniques that can be used are as follows: been installed on a secure network without explicit authorization from a local network administrator, whether added by a Enough client is a client that doesn’t belong to your etwork anyway. An Access Point is a device such as a wireless router permits wireless devices to connect to a network. WIRED EQIVALENT PRIVACY is a security algorithm for IEEE 802.11 wireless network - of - service A High Gain Antenna is an antenna with a narrow radio beam that is used to increase signal strength. SECURITY FEARURES OF WLAN’s The major security services for IEEE802.11 are provided by wired equivalent privacy protocol. As per the IEEE standards there are three basic security features described for wireless networks. They are Authentication Confidentiality Integrity. Authentication: A primary goal of WEP ( PRIVACY) was to provide a security service to check the ID of communicative clients stations. This gives access control to the network by avoiding access to the client station that cannot authenticate Confidentiality: Confidentiality, or Privacy, was a second goal of WEP the intent was to prevent information compromise from causal eavesdropping. Integrity: Another goal of WEP was a security service created to ensure that messages are not mod wireless clients and access the point in an active attack. THE RISKS OF WIRELESS SECURITY IN AN ENTERPRISE: For an enterprise there is lot more than just protecting the network from various attacks. There are different measures enterprise can take, in order to secure their network and the most important one is to keep their wireless access points as safe as possible. The Important reason to keep access points safe is that the attackers do not require specific packing tools as the system itself finds the network when it comes in the range. One of the major risks for an enterprise from their own naïve employees the can contact company databases from a browser and they do the same when the want to work at home. The attackers can take advantages of this and instead of breaking into the security system they would observer the activities of employees and given a chance would get enough knowledge that they can then trick themselves as sincere uses of the enterprise. Conclusion: Wireless network security faces a number of hurdles and efforts are being put on, but are relatively new and thus not fully developed. Since wireless technology has huge market but has become almost inexpensive. It is gaining popularity in all sorts of business. These strength of the system security is always countered by its weakest component. So the International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 931 the IEEE standards there are three basic security features described for wireless networks. They are WEP (WIRED EQIVALENT PRIVACY) was to provide a security service to check the ID of communicative clients stations. This gives access control to the network by avoiding access to the client station that cannot authenticate properly. Confidentiality, or Privacy, was a second goal of WEP the intent was to prevent information compromise from causal eavesdropping. Another goal of WEP was a security service created to ensure that messages are not modified in transit wireless clients and access the point in an active THE RISKS OF WIRELESS SECURITY IN AN For an enterprise there is lot more than just protecting the network from various attacks. There are different can take, in order to secure their network and the most important one is to keep their wireless access points as safe as possible. The Important reason to keep access points safe is that the attackers do not require specific packing tools as the self finds the network when it comes in the range. One of the major risks for an enterprise from their own naïve employees the can contact company databases from a browser and they do the same when the want to work at home. The attackers can take s of this and instead of breaking into the security system they would observer the activities of employees and given a chance would get enough knowledge that they can then trick themselves as curity faces a number of hurdles and efforts are being put on, but are relatively new and thus not fully developed. Since wireless technology has huge market but has become almost inexpensive. It is gaining popularity in all sorts of th of the system security is always countered by its weakest component. So the
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com end-users must be given proper training on how to secure the data when they are at home or at the private sectors. So that the combined effort of users, employers and system administrators against such malicious activities. Appropriate counter measures can help the organisation to minimise the risk of illegal penetration. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 users must be given proper training on how to secure the data when they are at home or at the private sectors. So that the combined effort of users, inistrators against such malicious activities. Appropriate counter measures can help the organisation to minimise the risk of REFERENCES: 1. https://www.researchgate.net/...A.../Wireless Network-Security-A-filed- 2. https://epdf.tips/handbook- networks-applications-technology st.html International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 932 https://www.researchgate.net/...A.../Wireless- -Study -of-wireless-local-area- technology-security-and-