Free Essay

Wireless Network

In:

Submitted By imesyada
Words 3541
Pages 15
WIRELESS LOCAL AREA NETWORK: SECURITY ISSUES AND COUNTERMEASURES IN ORGANISATION

Nor Rasyidah Binti Haminudin2011634444M. Sc. (Information Technology)Faculty Of Computer And Mathematical SciencesUniversity Technology MARA, Malaysianorrasyidah.haminudin@gmail.com | | |

ABSTRACT
Every organisation today is looking to implement Wireless Local Area Network (WLAN) infrastructure to improve its communication capabilities by providing access anywhere for employees, and more importantly, convenient access for customers and other users. WLAN provides users many benefits such as portability, flexibility, reduced hardware need and lower installation cost. Without a doubt, the benefits of WLAN enhance an organisation’s overall productivity. However, WLAN is not without its own security problems. WLAN infrastructures that are not secured would actually affect the security posture of the LAN environment as well. Having an unsecured WLAN can result in a loss of service, or can be used as a staging area to launch attacks against other networks. The significant challenges faced today in securing wireless LANs are maintaining privacy, data confidentiality, and preventing unauthorized access using proper access control mechanisms. This paper will mainly focus on the wireless access points (APs) as devices that act as a central transmitter and receiver or WLAN radio signals. It will begin by introducing the concept of WLAN. The introductory section gives brief information on the WLAN components and its architecture. In order to examine the WLAN security threats and vulnerabilities, this paper will look at Rogue APs, Ad-Hoc Networks, MAC Spoofing, Honeypot APs and Denial of Service.
Keywords: Wireless Local Area Network, WLAN, Wireless Security, Wireless Access Points, Wireless Security Threats, Vulnerabilities

1.0 Introduction
A WLAN is a flexible data communications system that can use either infrared or radio frequency technology to transmit and receive information over the air. WLAN has been widely used in many sectors ranging from corporate, education, finance, healthcare, retail, manufacturing, and warehousing. It has increasingly becoming an important technology to satisfy the needs for installation flexibility, mobility, reduced cost-of-ownership, and scalability ( (Hamid, 2003).

The WLAN connects the computers and other network devices via an access point (AP). The AP acts like a transceiver that provides devices a certain amount of mobility. Access point devices usually have a coverage radius up to 300 feet for indoor and covers the radius of 1800 feet for outdoor networking. (M. Krishnakumar Kappes, 2004). This area of coverage is called a cell and users roam within the cell with their wireless laptops or any hand-held devices such as smart phones, IPad and others. Although the wireless network configuration and reconfiguration is easier, faster and less expensive, wireless network must be efficiently monitored and there are some important security issues to be aware of.

1.1 WIRELESS COMPONENTS
One important advantage of WLAN is the simplicity of its installation. Installing a wireless LAN system is easy and can eliminate the needs to pull cable through walls and ceilings. The basic components of a WLAN are quite simple and it consists of access points (APs) and Network Interface Cards (NICs)/ client adapters.

1.2.1 Access Points

Access Point (AP) is essentially the wireless equivalent of a LAN hub. It is typically connected with the wired backbone through the standard Ethernet cable, and communicates with wireless devices by means of an antenna. An AP operates within a specific frequency spectrum and uses 802.11 standard specified modulation techniques. It also informs the wireless clients of its availability, authenticates and associates wireless clients to the wireless network.

1.2.2 Network Interface Card (NICs)/ Client Adapters

Wireless client adapters connect PC or workstation to a wireless network either in ad hoc peer-to-peer mode or in infrastructure mode with APs. The NIC scans the available frequency spectrum for connectivity and associates it to an access point or another wireless client. It is coupled to the PC/workstation operating system using a software driver. The NIC enables new employees to be connected instantly to the network and enable Internet access in conference rooms.

1.2 WLAN CONFIGURATIONS

The WLAN components mentioned above are connected in certain configurations. There are three main types of WLAN architecture: Independent, Infrastructure, and Microcells and Roaming. (Pulsewan.com, 2002)

1.3.3 Independent WLAN

The simplest WLAN configuration is an independent (or peer-to-peer) WLAN or also be known as ad-hoc mode (Arbaugh, Shankar, & Wan, 2001). It is a group of computers, each equipped with one wireless LAN NIC/client adapter. In this type of configuration, each client communicates directly with the other clients within the network without the use of access point. Each computer in the LAN is configured at the same radio channel to enable peer-to-peer networking. Independent networks is designed such that only the clients within transmission range (within the same cell) of each other can communicate. Figure 1 shows the architecture of Independent WLAN.
Client A
Client C
Client B

Figure 1: Independent WLAN (Pulsewan.com, 2002) 1.3.4 Infrastructure WLAN
In infrastructure WLAN, each client sends all of its communications to a central station, or access point (AP). The access point acts as an Ethernet bridge and forwards the communications onto the appropriate network either the wired or wireless network (see Figure 2). This network configuration satisfies the need of large-scale networks arbitrary coverage size and complexities. Figure 3 shows the architecture of Infrastructure WLAN. Figure 2: Example of Infrastructure Network (Arbaugh, Shankar, & Wan, 2001)

Figure 3: Infrastructure WLAN (Pulsewan.com, 2002) 1.3.5 Microcells and Roaming
The area of coverage for an access point is called a "microcell’. The installation of multiple access points is required in order to extend the WLAN range beyond the coverage of a single access. One of the main benefits of WLAN is user mobility. Therefore, it is very important to ensure that users can move seamlessly between access points without having to log in again and restart their applications.

Seamless roaming is only possible if the access points have a way of exchanging information as a user connection is handed off from one access point to another. In a setting with overlapping microcells, wireless nodes and access points frequently check the strength and quality of transmission. The WLAN system hands off roaming users to the access point with the strongest and highest quality signal, in accommodating roaming from one microcell to another. Figure 4 shows the architecture of Microcells and Roaming.

Figure 4: Microcells and Roaming (Pulsewan.com, 2002) 2.0 WIRELESS NETWORK VULNERABILITIES AND THREATS

Wireless technology sometimes allows threats, attacks and vulnerabilities to enter the wireless space. Malicious people will exploit any known weaknesses through service attacks, worms, spam, malware and man-in-the-middle attacks.

Wireless networks also have three additional aspects that make the security of wireless networks even more challenging than the security of wired networks: (Petajasoka, Makila, Varpiola, Saukko, & Takanen, 2008)

* Wireless networks are always open * Attackers can connect into the network from anywhere and from any distance * Attackers are always anonymous

As wireless communications and Internet become truly interoperable, users may want the communications channel to be secure and available when needed. For a message sent using this wireless communication channel, the user expect assurance of: (Boncella, 2002) * Authentication (the sender and receiver are who they say they are) * Confidentiality (the message cannot be understook except by the receiver); and * Integrity (the message was not altered)
This section explains 5 examples of important threats and vulnerabilities: Unauthorized APs, MAC Spoofing, Denial of Services, Honeypot APs, and Ad-Hoc Networks.

3.1 Unauthorized Access Points
Unauthorized APs are those that are visible to sensors, but not deployed by network administrators as corporate/organisation’s APs. It is also known as a rogue AP (see Figure 5). When a user turns on a computer and it latches on to a wireless access point from a neighboring organisation’s overlapping network, the user may not even know that this has occurred. However, it is a security breach in which the proprietary organisation information’s is exposed and they could obtain a connection from one organisation to the other. (Choi, Robles, & Kim, 2008)

There are possible threats that might occur if users access the Internet through rouge APs:

* External hackers can gain access to the internal network via the rogue AP. * Creates an open access to any users. * Possible confidential data leakage to external hackers.

Figure 5: Connection to Unauthorized Access Point

3.2 MAC SPOOFING

MAC spoofing is also known as ‘man-in-the-middle attack’, that is unlikely to happen by accident. An external AP can copy the User’s AP’s MAC address and SSID in order to appear identical. Users will normally associate with the AP with the stronger signal. Users also may associate initially to the spoofing AP, or even transfer the connection in the middle of a transaction because of a stronger signal. (See Figure 6)
Most wireless systems allow some kind of MAC filtering to only allow authorized computers with specific MAC IDs to gain access and utilize the network. However, there are several existing programs / software that have the ability to conduct network sniffing. Combination of these programs with other software will allow a computer to pretend it has any MAC address that the hackers’ desires and the hackers can easily get around that hurdle. (Choi, Robles, & Kim, 2008)

The possible threats that could happen when users connect to this access points are:

* External hackers can gain access to the internal network via the mis-configured/hacked AP. * Creates an open access to any users. * Possible confidential data leakage to external hackers, data rerouting, data theft and any other attacks.
[Type a quote from the document or the summary of an interesting point. You can position the text box anywhere in the document. Use the Text Box Tools tab to change the formatting of the pull quote text box.]

Figure 6: Connection to MAC Spoofing’s AP

3.3 DENIAL OF SERVICES

A Denial-of-Service attack (DoS) occurs when an attacker continually bombards a targeted access point or network with bogus requests, premature successful connection messages, valid or invalid messages, and/or other commands (See Figure 7). These cause legitimate users unable to get on the network and may even cause the network to crash. Due to the nature of the radio transmission, the WLAN are very vulnerable against denial of service attacks. The relatively low bit rates of WLAN can easily be overwhelmed and leave them open to denial of service attacks. By using a powerful enough transceiver, radio interference can easily be generated that would unable WLAN to communicate using radio path (Boncella, 2002). This will cause the organisation to face the situation of a total shutdown or downtime to the enterprise wireless connectivity.

Figure 7: Denial of Service Attack

3.4 HONEYPOT ACCESS POINTS

A Honeypot access points is a fake access point with the similar service set identifier (SSID) to the organisation’s SSID which can attract users from the organisation network to connect to it. The SSID is the network identifier for a WLAN.(See Figure 8) A user may associate with the wrong WLAN if the SSIDs are identical.

The possible threats that can associate with Honeypot access points are:

* External hackers can gain access to the internal network via the connected wireless host if the host connected to a wired LAN. * Possible confidential data leakage to external hackers, data rerouting, data theft and any other attacks.

Figure 8: Connection to Honeypot Access Point

3.5 AD-HOC NETWORKS

Ad-hoc networks can pose a security threat. Ad-hoc networks are defined as peer-to-peer networks between wireless computers and does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. (Choi, Robles, & Kim, 2008) (See Figure 9)
Instead, each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. In addition to the classic routing, ad-hoc networks can use flooding for forwarding the data.

If an external/unauthorized user forms an ad-hoc network with a corporate/authorized user, it will be a security breach. Whereas, if an ad-hoc network profile exists on the corporate client, it could potentially join an ad-hoc network automatically, without the end user realizing it.

Figure 9: Ad-Hoc Connection

3.0 SECURING WIRELESS ACCESS POINTS

This section will describe some techniques a network administrator can use to secure 802.11b/g/n wireless network. Securing a wireless network is very important because intruders can not only borrow an organisation’s Internet connection, but also access the files and check up on what the organisation is doing. Even worse, hackers can use the internet connection to upload illegal materials or collect any important and secret information from your organisation’s network.

4.6 CHANGING DEFAULT SSID AND DO NOT BROADCAST IT

Service Set Identifier (SSID) is a unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to a particular WLAN. The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. The SSID for the access point is likely to be a standard, default ID assigned by manufacturer to all hardware of the model. It is advisable to change the SSID to a unique name. Not changing the default SSID is one of the most common security mistakes made by WLAN administrators. This is equivalent to leaving a default password in place. (Hamid, 2003)

Most WLAN access points are automatically (and continually) broadcast the network's name, or SSID. This will makes the wireless users extremely convenient since it can locate a WLAN without having to know what it's called, but it will also make an organisation’s WLAN visible to any wireless systems within range of it. It is advisable to disable the identifier broadcasting mechanism for the organization’s network and makes it invisible to the neighbors and passers-by although it will still be detectible by WLAN "sniffers".

4.7 USE STRONG ENCRYPTION

The first line of defense for an organisation’s WLAN is encryption, which encodes the data transmitted between computers or any hand-held devices and wireless access points. Unfortunately, most access point ship with encryption turned off, and many network administrator do not turn it on, leaving themselves completely exposed. It is advisable to enable access point’s encryption, and use the strongest form supported by organisation’s network. The Wireless Protected Access (WPA) protocol and more recent WPA2 have supplanted the older and less-secure Wireless Encryption Protocol (WEP).

Go with WPA or WPA2 if at all possible, since WEP is relatively easy to crack. The keys used by WPA and WPA2 change dynamically, which make them nearly impossible to hack. Use a strong password for the encryption key, such as a combination of letters and numbers of 14 characters or more. (Cisco Systems, 2006)

However, if the organization still using the older access points that support WEP only, it will be safest to use 128-bit WEP keys. Besides, it is also recommended for the network administrator to check the manufacturer's Web site for a firmware update that will add WPA support. If it doesn't look like an update is likely, consider replacing old adapters and routers with newer models that support WPA. Look for a router that supports the hybrid WPA + WPA2 mode, which lets the use of stronger WPA2 encryption with adapters that support it, while still maintaining compatibility with WPA adapters. (Cisco Systems, 2006)

4.8 UTILIZE VPN

Many companies and organisations have a virtual private network (VPN). VPNs allow employees to connect securely to their network when away from the office. A VPN is a much more comprehensive solution in a way that it authenticates users coming from an untrusted space and encrypts their communication so that someone listening cannot intercept it.

A secure method of implementing a wireless AP is to place it behind a VPN server. This type of implementation provides high security for the wireless network implementation without adding significant overhead to the users. If there is more than one wireless AP in the organisation, it is recommended to run them all into a common switch, then connecting the VPN server to the same switch. Then, the desktop users will not need to have multiple VPN dial-up connections configured on their desktops. They will always be authenticating to the same VPN server no matter which wireless AP they have associated with. (Penton Media, Inc, 2002) Figure 10 shows secure method of implementing a wireless AP.

Figure 10: Securing a Wireless AP ( (Penton Media, Inc, 2002)

4.9 UTILIZE STATIC IP

By default, most wireless LANs utilize DHCP (Dynamic Host Configuration Protocol) to more efficiently assign IP addresses automatically to user devices. A problem is that DHCP does not differentiate a legitimate user from a hacker. With a proper SSID, anyone implementing DHCP will obtain an IP address automatically and become a genuine node on the network. By disabling DHCP and assigning static IP addresses to all wireless users, it can minimize the possibility of the hacker obtaining a valid IP address. This limits their ability to access network services. On the other hand, someone can use an 802.11 packet analyzer to sniff the exchange of frames over the network and learn what IP addresses are in use. This helps the intruder in guessing what IP address to use that falls within the range of ones in use. Thus, the use of static IP addresses is not fool proof, but at least it is a deterrent. Also keep in mind that the use of static IP addresses in larger networks is very cumbersome, which may prompt network administrator to use DHCP to avoid support issues. (Hamid, 2003)

4.10 MAC ADDRESS FILTERING

Every computer that is able to communicate with a network is assigned with its own Media Access Control (MAC) address. A MAC address is a unique code to a specific network adapter. Wireless access points usually have a mechanism to allow only devices with particular MAC addresses access to the network. So, by turning MAC address filtering, network administrator can limit network access to only organisation’s systems or legitimate users. In order to use MAC filtering network administrator need to find (and enter into the router or AP) the 12-character MAC address of every system that will connect to the network. It is quite cumbersome, especially if it there are lots of wireless users or if the organisation’s users change a lot.

However, MAC addresses can be "spoofed" (imitated) by a knowledgeable person, so while it's not a guarantee of security, it does add another hurdle for potential intruders to jump in.

4.0 CONCLUSION

Nowadays, computer users are interested in convenience and mobility accessing the Internet wirelessly. Today, business travelers use wireless laptops to stay in touch with the home office; vacationers beam snapshots to friends while still on holiday; and shoppers place orders from the comfort of their couches. A wireless network can connect computers in different parts of your home or business without a tangle of cords and enable you to work on a laptop anywhere within the network’s range.

Besides all the advantages of using wireless network, there are some downsides to be aware of. The downside of a wireless network is that, unless you take certain precautions, anyone with a wireless-ready computer can use your network or even access the information on your computer. And if an unauthorized person uses your network to commit a crime or send spam, the activity can be traced back to your account.

As a conclusion, there is no perfect security solution for wireless network. However, although it is impossible to totally eliminate all risks associated with wireless networking, it is possible to achieve a reasonable level of overall security by adopting a systematic approach to assessing and managing risk.

5.0 REFERENCES

Arbaugh, W. A., Shankar, N., & Wan, Y. J. (2001). Your 802.11 Wireless Network has No Clothes. 4-5.
Boncella, R. J. (2002). Wireless Security: An Overview. Communications of the Associations for Information Systems (Vol. 9, 2002), (pp. 269-271).
Choi, M.-K., Robles, R. J., & Kim, T.-H. (2008). Wireless Network Security: Vulnerabilities, Threats and Countermeasures. International Journal of Multimedia and Ubiquitous Engineering Vol. 3, No. 3, July, 2008 , 78-84.
Cisco Systems. (2006). 5 Steps to Securing Your Wireless LAN and Preventing Wireless Threats. Cisco Systems, Inc.
Hamid, R. A. (2003). GIAC Security Essentials Certification. Wireless LAN: Security Issues and Solutions , 20.
M. Krishnakumar Kappes, A. K. (2004). Estimating Signal Strength Coverage for a Wireless Access Points. Global Telecommunication Conference, 2004, GlobeCom '04.IEEE, (pp. 3264-3269, Vol.5).
Penton Media, Inc. (2002). Use VPN for Wireless Security.
Petajasoka, S., Makila, T., Varpiola, M., Saukko, M., & Takanen, A. (2008). Wireless Security: Past, Present and Future. Codenomicon White Paper Ver. 1.0, 2008, (pp. 3-5).
Pulsewan.com. (2002, Dec. 2). Retrieved from "What is WLAN?" The Wireless Networking Industry's Information Source: http://www.pulsewan.com/data101/wireless_lan_basics.htm

Similar Documents

Premium Essay

Wireless Networks

...Wireless Networks Wireless media is an essential part of everyday life now. Without it businesses would not be able to perform as efficient. Ever since wireless media came about, telecommunications turned the use of the Internet, electronics, and fiber optics. With the advancement of wireless media telecommunications businesses have the ability to send and receive messages to one another instantly eliminating the need of sending letters through the post office. One major challenge to developing a system of communications based on wireless media is the security. More than ever companies and individuals use this wireless technology to their advantage, for important documents or information they want kept to themselves, such as e-mail, mobile money transactions, and data transmissions. As these wireless technologies grow, and keep vital information, hackers begin to implement new ways to attack these new technologies. It is difficult to apply security into smaller devices with low power processors, minimal memory capacities and that use unreliable, low-bandwidth wireless networks. Smart phones that incorporate wireless technologies have changed the business world in numerous ways. With smart phones people can check and respond to important emails or calls when away from the office or workplace. Most businesses today require their corporate workers, managers, and supervisors to carry smart phones or mobile devices at all times. Businesses are now more than ever relying on mobile...

Words: 293 - Pages: 2

Premium Essay

Wireless Networks

...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Wireless Home Network Student Name: Degree Program: Information Technology Mentor Name: Signature Block Table of Contents Capstone Proposal Summary 1 Review of Other Work 2 Rationale and Systems Analysis 3 Project Goals and Objectives 5 Project Timeline and Milestones 6 Project Deliverables 8 References 10 Appendix 1: Competency Matrix 11 1 Capstone Proposal Summary This project is going to entail upgrading and installing new components to an existing wireless home network. This is a two story home with attic and basement. Inside this home, there are 8 rooms. A living area, an office area, kitchen, laundry room, 1 ½ bathrooms and 3 bedrooms. Following an interview and on site evaluation to assess what the current needs are, along with the direction of technology in the future. The new network needed to be focused on wireless connectivity of their various devices, which included smart phones, tablets and laptops. There also needed to be easy access for guests who wanted to connect to the wireless network for their own tablets, smart phones and laptops. Currently, the home has DSL internet service, with a basic wireless G router. The DSL service was adequate for the current network setup, but with more and more online content, they were having a problem with lag between devices. The current speed...

Words: 2803 - Pages: 12

Free Essay

Wireless Sensor Network

...Wireless Sensor Networks and Their Usage Ali Raza,Shahid Rasheed & Shazib Javeed University Of Central Punjab Abstract Innovations in industrial, home and automation in transportation represent smart environments. Wireless Sensor Networks (WSNs) provide a new paradigm for sensing and disseminating information from various environments, with the potential to serve many and diverse applications Networks (WSN), where thousands of sensors are deployed at different locations operating in different modes .WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication capability and sufficient intelligence for signal processing and networking of the data. Wireless Sensor Networks (WSN) are used in variety of fields which includes military, healthcare, environmental, biological, home and other commercial applications. With the huge advancement in the field of embedded computer and sensor technology, Wireless Sensor Networks (WSN), which is composed of several thousands of sensor nodes which are capable of sensing, actuating, and relaying the collected information, have made remarkable impact everywhere? Key Words Wireless Sensor Network (WSNs) Structural Health Monitoring (SHM) Micro Electro-Mechanical Systems (MEMS) Introduction Sensor network is capable of sensing, processing and communicating which helps the base station or command node to observe and react according to the condition in a particular environment (physical...

Words: 2659 - Pages: 11

Free Essay

Wireless Networks

...RUNNING HEAD: Wireless network trends Wireless Network Trends Prepared by: Rossell Powell Professor Yana Todorova ISSC321 I002 Win 12 American Public University 02-25-2012  Networking abilities in households is an important feature as an increasing number of students attend school online and still others work from home. With this increase, an increase in the number of computers in the household increases and all are dependent upon one Internet source. There are advantages and disadvantages to household network set-ups ( Dubendorf, V. A. (2003) The advantages in the ability to form a home network are numerous. The three main advantages to home networking are: sharing a single Internet connection among multiple computers, sharing files among computers, and using a printer or other device connected to another computer. Another advantage is that less wiring is needed when additional computers have wireless capabilities (Freeze, J. T. 2000). “The addition of wireless capabilities to these gateway devices gives the user the convenience of taking a computer anywhere in the house, and not have to worry about running wires through walls and crawl spaces and attics to connect computers in various parts of the house” .While the student is doing homework, the parent can continue to do work online and access their e-mails.  Security issues are the biggest disadvantage to home networking. From , there are at least four types of security issues that exist. The first is...

Words: 1005 - Pages: 5

Premium Essay

4g Wireless Network

...4G Wireless Networks: Opportunities and Challenges Hassan Gobjuka Verizon 919 hidden Ridge Irving, TX 75038 Abstract With the major wireless service providers planning to start deployment of 4G wireless networks by mid 2010, research and industry communities are racing against time to find solutions for some of the prominent still open issues in 4G networks. The growing interest in 4G networks is driven by the set of new services will be made available for the first time such as accessing the Internet anytime from anywhere, global roaming, and wider support for multimedia applications. In this paper describe some of the key opportunities will be made available by 4G networks, present key challenges and point to some proposed solutions. Index Terms—4G networks, Wireless Networks, Security and Privacy, Quality of Service, Architecture I.INTRODUCTION The existence of 4G Networks in today’s technology-driven society is important indicators of advancement and change. 4G, or Fourth Generation networks, are designed to facilitate improved wireless capabilities, network speeds, and visual technologies. It is anticipated that as these networks continue to thrive, the demand for advanced related technologies will also grow, thereby creating new alternatives for savvy technology users to exceed their desired expectations. The following discussion will evaluate the current state of 3G Networks and will examine the future potential of these networks in expanding technology-based capabilities...

Words: 2759 - Pages: 12

Premium Essay

Wireless Network Proposal

...with a great potential to grow in the market. In order to grow in the current market, Party Plates needs to continue to make technological advances. Through the increase in technology in the work place we can boost communications and cut costs. A great option for Party Plates to increase technology is to start utilizing wireless technologies. Personal Area Networks (PAN) PAN deals with short –range wireless networks. The main use for this technology is to eliminate cables connecting devices to peripherals. Usually, PAN include cordless products and Bluetooth. Wireless technology frees up floor space. With Bluetooth capability the company can wirelessly control equipment. In all technology, there are some pros and cons. The pros and cons for PAN are listed below. PROS • These wireless technologies are efficient. • They are also cost-effective. • Personal Area Networks are suitable for the business. CONS • If there are some technologies with the same radio bands some wireless technology can have interference. • Bluetooth is use for short range and is not capable of larger distances. Global Positioning Systems (GPS) The GPS is a wireless system that uses satellites to enable users to determine their position anywhere on earth (Rainer, 2011). PROS • Keeping Track of your company vehicles o Ability to see where and how far out a vehicle is (Mira, 2007). • The safety of your employees • Recovering of stolen merchandise • Routing o The GPS equipment is design...

Words: 664 - Pages: 3

Premium Essay

Wireless Networks Essay

...Wireless Networks Wireless media has affected the world in a major way. It is said that technology, media, and telecommunications are in for a big change over the next 10 years. This is happening because of the new social wireless change ("Wireless Social Networking To Transform Tech, Media, Telecom", 2012). Companies now have to shift their strategies if they want to stay in competition. Wireless media is so dominant in the twenty-first century. Wireless media advances so fast it is hard for companies to keep up. It is said that technology advances to the likes of a dog. When a dog turns one year old, they are technically seven years old. Every year technology advances seven times further then technology was the previous year. There are many challenges that are faced the advancing new technology and social wireless media. The biggest challenge is security. Many companies and individual users would like to know that once they let their information leak wirelessly that the information is secure. Hackers are more present than ever before in the world of wireless communications. If a company wants to have wireless media for their telecommunications then they are going to have some pretty good security protecting all of their information. The government even has problems trying not to let any information get leaked over the web. Many of these companies that have chosen to have all of their communications go wireless also have chosen to do a lot of their business over...

Words: 470 - Pages: 2

Premium Essay

Wireless Network Connections

...Wireless Network Connections NT1110 Computer Structure and Logic Debbie Beals, Bill Fry, Donald Phillips Introduction If you find yourself in a fast food restaurant, trendy coffee shop or Hotel, your chances of being around a wireless network in the world today are very good. You may connect your computer at home or other electronic devices to a wireless network, also called WiFi or 802.11 networks. Wireless networks are easy to set up and mostly inexpensive. Very soon wireless networking may be available from just about anywhere and at any time. Bluetooth is a universal wireless standard for connecting various digital devices. Bluetooth is simply a way to connect devices to one another without the use of cables that transmits the signal over short distances. Bluetooth is “cable elimination technology”. Wireless Connections What is Wireless? Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. The most common wireless technologies use radio. With radio waves distances can be short, such as a few meters for television or as far as thousands or even millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of applications of radio wireless technology include GPS units, garage door openers...

Words: 2795 - Pages: 12

Free Essay

Wireless Network Project

...Wireless Network xxxxxxxxxxx Strayer University CIS 341 Professor Kevin Jayne My name is xxxxxxx from IT-Vets. Today we will go over the transfer of paper to electronic documentation. We will discuss the use of wireless technology and the risk that are involved. I will also provide ways to make sure we are as secure as we can be. I understand you are moving to electronic documentation due to a federal requirement. In 2004, President George Bush proposed a law that all medical documentation will be electronic by 2014. He stated “by computerizing health records, we can avoid dangerous medical mistakes, reducing cost and improve care.” With this said it is better to act now and get you changed over instead of waiting till the last minute. First thing we will do is go over the plan of attack. With any wireless network the first thing to think about is security. You don’t want just anyone in your network, especially with the sensitive information we will be housing on our network. One of the best ways to do this is to remain invisible. When you drive around with your phone and you have WiFi enable and you pickup signals all over, this is an example of broadcasting your signal. With only authorized users on this network, there is no need to publicly broadcast we have a wireless network. This to me is like a company broadcasting “come see if you can get into my network”. Without the carrot dangling in front of your company you will have less rabbits trying to nibble. Another...

Words: 610 - Pages: 3

Premium Essay

Wireless Networks & Network Security

...Wireless Networks & Network Security ISSC 340 Professor Vijay Venkatesh James Lange 08/13/2013 Wireless Networks are somewhat new technology in comparison to the know-how that makes them possible. The knowledge regarding wireless technology goes back about 200 years. One of the first individuals deserving recognition for today’s wireless networks is a scientist, inventor and politician named Benjamin Franklin. In 1747 he had built a model that showed how electricity could move through the air unaided by any type of wiring. In the early 1750’s Mr. Franklin started experimenting with electricity and the rest is history. Franklin was under the belief that lightening was an electrical current. So with the famous kite and key experiment he proved to himself and others that he was right. His fascination with electricity led him to later experiments with an electrical tube given to him by a friend. A second individual that played a part in today’s wireless technology is Hans Christian Oersted. In 1819 he had found that a compass needle had movement if it was presented with electrical current. This relationship between the needle and the electricity is an essential part of electromagnetism. It is said that this discovery by Oersted happened completely by chance. While preparing for one of his lectures he was setting up some of his equipment. The compass and battery were in close proximity to each other and the needle moved from magnetic north whenever the switch to the...

Words: 3213 - Pages: 13

Free Essay

Wireless Network Security

...Paper CNT4514 Wireless Vulnerabilities The world of wireless networks as we all know is one of the most rapidly growing areas in our world today. With the massive amount of data that is going on, “the cloud” the security of all of our data is questioned. As well with so many of our day to day tasks relying on our wireless capabilities it make you wonder how safe is it to rely so heavily on something. We have to ask the questions what are the key vulnerabilities of wireless networks and even just of networks in general. Different types of networks have different levels of safety and it is a good idea to know not only which are safe but the vulnerabilities of said networks to keep our information out of the wrong hands and keep our day to day life moving as smoothly as possible. Unlike wired LANs the wireless LAN users are not restricted to the physical area of a wired system. While this may feel beneficial to the user it is also very beneficial to sniffing and eavesdroppers who are listening to the radio waves that are broadcasted through the air. Intercepting these packets they can pick up messages that may contain sensitive information. Seeing how the range of a wireless LAN can extend beyond the building the eavesdroppers don’t even need to be inside the building. A simple thing you can do is open up your wireless adapter on your computer and see how many open wireless networks are around you. From my house I currently have 4 open wireless networks that I can connect...

Words: 1614 - Pages: 7

Free Essay

Prolonging the Lifetime of Wireless Sensor Network.

...INTRODUCTION Wireless Sensor Networks (WSNs) are distributed embedded systems composed of a large number of low- cost, low-power, multifunctional sensor nodes. The sensor nodes are small in size and communicate wirelessly in short distances. These tiny sensor nodes can perform sensing, data processing and communicating. They are densely deployed in the desired environment. A sensor network consists of multiple detection stations called sensor nodes, each of which is small, lightweight and portable. Every sensor node is equipped with a transducer, microcomputer, transceiver and power source. The transducer generates electrical signals based on sensed physical effects and phenomena. The microcomputer processes and stores the sensor output. The transceiver, which can be hard-wired or wireless, receives commands from a central computer and transmits data to that computer. The power for each sensor node is derived from the electric utility or from a battery. Sensors use a signal of some sort, from the environment and convert it to readable form for purpose of information transfer. Each sensor node has multiple modalities for sensing the environment such as acoustic, seismic, light, temperature, etc. However, each sensor can sense only one modality at a time. The sensor nodes in the target tracking WSN use collaboration with the neighboring nodes. This requires data exchange between sensor nodes over an ad hoc wireless network with no central coordination medium. There...

Words: 1981 - Pages: 8

Free Essay

4g Wireless Networks

...500 4G Wireless Networks In telecommunications fourth generation (4G) represents the latest stage in the evolution of wireless data technologies. It is the successor to third generation (3G). A 4G system provides mobile ultra-broadband internet access to smartphones and other mobile devices. 4G mobile network standards enable faster data transfer rates than 3G. 4G has significant implications for the cloud. More and more businesses are migrating to Software-as- a-Service (SaaS) model. SaaS is a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the internet 4G provides faster service to the applications while on the move. The data input for 3G is up to 3.1 with an average speed range between 0.5 to 1.5. The data input for 4G is 2 to 12 megabits per second (Mbps), but has a potential estimated at a range of 100 to 300 MBPS. 3G has a peak upload rate of 5Mbps compared to 4G 500 Mbps. The network architecture for 3G is wide area cell based. The network architecture for 4G is an integration of wireless local area network (LAN) and wide area. The service and applications for 3G are CDMA 2000, UMTS, and EDGE. The service and applications for 4G are Wimax2 and LTE-Advance. 4G network enables users to freely roam across different communication systems, so the user conception 4G is that they can avoid dropped calls, roaming charges and dead spaces with the 4G network. The...

Words: 885 - Pages: 4

Premium Essay

Wireless Mesh Network

...WIRE LESS MESS NETWORK WITH HRPU ABSTRACT A Wireless mesh network is a mesh network created through the connection of wireless access points installed at each network user’s locale. Each user is also a provider, forwarding data at next node. The networking infrastructure is decentralized and simplified because each node need only transmit as far as the next node. Wireless mesh networking could allow people living in the remote areas and small businesses operating in rural neighborhoods to connect their networks together for affordable Internet connections. Here we discuss a hybrid routing algorithm for wireless mesh networks. In HRPU, the mesh portal periodically broadcasts a mesh update message, which allows all nodes to have a route towards the mesh portal stored semi permanently in their routing table. Whenever a node has data to be sent to backbone network, it sends the data without any route establishment delay using the route to the mesh portal. In HRPU the mesh portals and mesh points are intelligent which further improves the performance. INTRODUCTION The Beginning: Wireless Mesh Networking (WMN) was developed as a quick way to set-up wireless networks during military operations. Since then it has grown considerably in popularity based on its advantages in both metropolitan and rural applications. WMNs are being applied as Hot Zones, which cover a broad area, such as a downtown city district. By 2010, municipal Wi-Fi networks will cover over 325...

Words: 4177 - Pages: 17

Free Essay

Wireless Sensor Networks

...SECURE ROUTING IN WIRELESS SENSOR NETWORKS By [Name] The Name of the Class (Course) Professor (Tutor): The Name of the School (University): The City and State The Date: Abstract. Wireless sensor networks (WSANs) are a group of sensors and actors that are linked by a wireless medium for the purpose of performing distributed sensing and action on a given task. This involves the sensors collecting information about the surrounding physical environment and sending the information to the actors which take the decisions and perform some needed action basing on the information received from the sensors about the surrounding environment. These sensor networks are sometimes referred to as wireless sensor and actuator networks. They monitor physical or environmental conditions such as sound, pressure, temperature among others and send the collected data to the required location. Effective sensing and acting requires a distributed local coordination methods and mechanism among the sensors and the actors in addition to this, sensor data should be valid in order for right and timely actions to be performed. This paper describes secure routing in wireless sensor networks and outlines its threats on security. Keywords: Wireless sensor and actor networks; Actuators; Ad hoc networks; Sybil attack; Real-time communication; Sinkhole; Routing; MAC; adversary. Introduction With the recent rapid improvement on technology, many networking technologies have been created to make...

Words: 5106 - Pages: 21