Nothing Special   »   [go: up one dir, main page]

Skip to main content

Security Threats and Countermeasures in WLAN

  • Conference paper
Technologies for Advanced Heterogeneous Networks (AINTEC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3837))

Included in the following conference series:

Abstract

Wireless-the name says it all: ”Cut the cord”. Today there is no hotter area of development than wireless networking. Enterprizes are rapidly adopting wireless local area networks (WLANs). Driving this rapid adoption is the low-cost and inherent convenience of rapidly deployed connectivity solutions, which are not burdened by a wired infrastructure. WLAN have been in the news quite a lot, recently both from the perspective of growing popularity and in terms of security vulnerabilities that have been discovered in the wired equivalent privacy (WEP) security standard, which is supposed to ensure the security of data that flows over the networks. While wireless LANs are convenient and provide immediate connectivity, they also impose unique management, security, and mobility challenges on network. Though “connect anywhere at anytime” promise of the wireless networks is beginning to become popular; there are a plenty of confusion among prospective users when it comes to security. Because WLAN impose such significant challenges, should all 802.11 networks be considered hostile to the prospective user? Not necessarily. A well-designed wireless LAN ensures that the network is well protected and easy to manage, without sacrificing the wireless user’s ability to roam seamlessly. This is a survey paper that focuses on the catalog of security risks and countermeasures of the wireless network. We describe the standard mechanisms available for authentication of users and the protection of the privacy and integrity of the data. A basic analysis of each security countermeasure is conducted by looking at the attack techniques addressed by the mechanism. Our analysis takes into account the perspective of both insiders and outsiders.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Stallings, W.: Wireless Communication & Networks. Prentice Hall, New Jersey (2001)

    Google Scholar 

  2. Ferguson, N., Schneier, B.: A Cryptographic Evaluation of IPsec. Counterpane InternetSecurity White Paper (1999)

    Google Scholar 

  3. Potter, B.: 802.1x: What it is, how its broken, and How to fix it. In: Black Hat 2002, Las Vegas, NV (2002)

    Google Scholar 

  4. Krishnamurthy, P., Kabara, J., Amornkul, T.A.: Security inWireless Residential Networks. IEEE Transactions on Consumer Electronics 48(1), 157–166 (2002)

    Article  Google Scholar 

  5. Fratto, S.: Mike: Mobile & Wireless Technology Tutorial. Wireless Security in Network Computing, CMP United Business Media (2001)

    Google Scholar 

  6. Mishra, A., Arbaugh, W.: An Initial Security Analysis of The IEE 802.1X Standard, University of Maryland Institute for Advanced Computer Studies Technical Report CS-TR-4328 and UMIACS-TR (2002)

    Google Scholar 

  7. Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. In: proc of the Seventh International Conference on Mobile Computing and Networking (2001)

    Google Scholar 

  8. Cisco Systems. Wireless LAN Enterprise Campus with Multi-Site Branch Offices, http://www.cisco.com

  9. Matthew, G.: A Technical Comparison of TTLS and PEAP. The O’Reilly Network White Paper (2002)

    Google Scholar 

  10. O’Hara, B., Petrick, A.: IEEE 802.11 Handbook: A Designers Companion. IEEE Press, New York (1999)

    Google Scholar 

  11. Stallings, W.: IEEE 802.11: Moving closer to Practical wireless LANs. IT Pro. 152, 17–23 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nagamalai, D., Dhinakaran, B.C., Sasikala, P., Lee, SH., Lee, JK. (2005). Security Threats and Countermeasures in WLAN. In: Cho, K., Jacquet, P. (eds) Technologies for Advanced Heterogeneous Networks. AINTEC 2005. Lecture Notes in Computer Science, vol 3837. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599593_13

Download citation

  • DOI: https://doi.org/10.1007/11599593_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30884-3

  • Online ISBN: 978-3-540-32292-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics