Wireless Security Preventive Methods

Wireless Security Preventive Methods

    Wireless Security Preventive Methods is used for network connectivity between two or more devices by using radio frequency or in air. Basically it includes wired infrastructure, client systems and access point. The network does not rely on pre built infrastructure so this network can be consider as Wireless Security Preventive Methodsad hoc. These are self configuring and dynamic networks. The nodes can be move anywhere and anytime. Some hardware devices such as routers, hubs, firewalls are used to forward the data.

Introduction

                Wireless network is the system in which the networking is done with wireless data connection. Radio waves are used to connect the network to computing devices. Costly process of cables is avoided by using this method.  The implementation of the radio cableis placed at OSI model’s physical layer. The wireless network includes mobile phones, wireless sensor networks, satellite communication method, wireless local area networks etc.

                                Also the security is also provides to these wireless network medias. This security is called wireless security. This is used to prevent unauthorized access to wireless computer networks. WEP is the security that is used commonly. The password that is used by WEP can be easily hacked. Some systems have pre-installed security wireless cards. Wireless security is created to provide the proper security to wireless network.

Background

                The history of the wireless network should be help to know about the facts that how security problem are affecting the system and how these attacks can be handling. Because of security concern, there was a need to accept the security challenges. Earlier in the 802.11, standards for the wireless network that makes two forms of authentication-OSA and SKA.  There were some issues that were faced with WEP. Main issues were:

  • Streaming algorithm was used.
  • Re-use the pre-packet master key
  • 11 Is sane sharing of keys?
  • It causes replay attack.

Security challenges

                As wireless networking is the type of networking in which the networking is done between devices are provided by wireless connection. To prevent the devices from unauthorized access the security is provided to network. As wireless networking has many positive points because user can work from anywhere he is suitable. But these are some issues also with wireless networking. Hackers can easily break the wireless networking and they can use some wireless technologies to do hacking in network that is using wired networking. Due to increasing of the risks the security challenge is becoming more popular and sincere challenge to be discussed. (Tsai, Lai, & Vasilakos, 2014). Hacking is easier with the windows and Linux based systems.

                It has been found that more than 95% company employees use wireless networking on their laptops or other computing devices. Due to synchronization the data loss is more expecting in wireless networking.

Problem Faced

                In these days wireless networking is growing rapidly. The wireless network systems like mobile phones, LAN are more essential part of daily life. Due to maximum usage of these wireless systems these are becoming the targets of the virus writers. Mostly hackers find out the wireless networks for hacking that are used by big companies. Due to attack of hackers there will be a risk of information stolen from the systems of the companies.

  • Authentication: The main problem faced due to wireless network is the authentication. Due to wireless system many users can have access on system and there will no need to have permission.
  • Small network: For small offices or homes the small wireless networking is used by users. With this users can only have access on those features that are declared on the box of wireless product.
  • Hackers: Attacks of the virus on wireless networks by the hackers is the big problem faced in these days. Due to hacking the hackers can have access on user’s mobile or system which might have user’s personal or important data or information.

Wireless Security Preventive Methods

Technologies used

                To prevent the systems from the unwanted virus attack or some other security threats there is need of proper security setup. This setup should be set to only those people to which user want them to allow using the wireless system. Some of them are given below:

  • Make wireless network invisible: if wireless network has any type of failure then anyone can access it. The network can be making invisible to others; access point’s user can be seeing manually by disabling identifier broadcasting.
  • Network traffic encryption: There should be encryption traffic passing between the system and network. By encryption, the wireless network can be converted into code and this can be making secure from unauthorized access. (DeSimone & Nanda, 1995)
  • Disable file sharing: In public wireless space, the file sharing is not secure. This may cause security concern because laptops are even closer to other wireless computer’s that are operating by others.

Applications

                For connectivity and remote monitoring there is some transmission methods used in wireless networking. There are long haul and short haul transmission methods used in wireless networking.

  • Mesh Networks: a network in which each network node is connected to others directly, is known as mesh network. Star topology is example of the mesh network.
  • Wireless security: In wireless network the wireless data connections are used for networking. The wireless networking helps to avoid the cost of cables for connecting the nodes of the networks. All the phone networks, sensor networks are the examples of the wireless security network.
  • Omara: Omara is a part of communication that is used to focus on digital and social media for security.
  • Critical Infrastructre protection: The critical infrastructure protection is secure and helps to recover the network from all viruses. The assets, networks and systems that are vital for public confidence are the examples of the Critical Infrastructure protection.

Clarification

                Wireless networking is used commonly in these days because it is most efficient method of networking. In this there is no need of wired devices for network connectivity. But this wireless networking is sometimes not secure as this may cause hacking of the networking. The wireless networks can be easily hacked and can be access by many of the users at one time. So in this case it is not secure. To avoid these security threats companies used some wireless network security techniques that can help to provide the secure and strong networking. Some applications like mesh network topology, Omara are used in case of secure wireless networking. (“Wireless Quality-of-Service support”, 2006)

Issued discussed

                There are many issues of the networking weather it is wired or wireless. The main issues in wireless networking are availability, integrity, and confidentiality.

  • Confidentiality: To provide the way to ensure the disclosed data should not be encrypted to unauthorized user. Only the user who has authority to access the information can be able to read that information.

  • Availability: In wired network the attacker has to be connected to network physically but on the other hand in wireless networking the hacker can be hack the network only in certain range of the network. (Iera, Marano, & Molinaro, 1996)
  • Integrity: The data in wireless networking can be easily intercepted and can be modify easily because the data is sent in wireless in air.

Security threats

                In this world of Wi-Fi, many enterprises are investing in faster and larger WLANs for supporting applications used by them. This can be notices that security is never taken as granted. There are some threats that are facing by the wireless security:

  • Service Denial
  • Wireless industries
  • Rogue APs(Chen & Lea, 2015)
  • Data Interception
  • Client’s misbehavior
  • Wireless phishing

Tools used

                In networking some helpful tools are used for troubleshooting and Wi-Fi scanning, site planning to protect the network from unwanted applications.

  1. For Wi-Fi scanning some scanners are used that includes some software’s. Metageek, InSSID for mobile phones that is android.
  2. In Site survey and planning Wi-Fi planner. Heatmapper tools are used for network security.
  3. In Testing and sniffing some tools like Kismet, Iperf are used. (Chou, Chang, & Wu, 2008)

Impact on real life

                Wireless networks are used by everyone in these days. These are become common place in environment. The wireless networks are widely used in many public areas, hospital, corporate offices etc. Mobile phone is also type of wireless network technology.

                                Sometime wireless networks affect the health of human being. Due to much use of the mobile phones a person can meet with some dieses that can harm the body badly.  Also it can affect the workplace too. Wireless networking, Radio frequency identifications can affect the human life badly.

Conclusion

                In this topic this is cleared that wireless security is as important as other securities. In wireless networking the hacking is easy. Anyone can be hack the network as the security is not as strong as required. So there are some ways and techniques by using which the security can be done tightly. There are some problems faced in this wireless security like authentication and hacking etc. There is need to overcome these issues and problems to make the networking working smoothly. Some networking applications like mesh technology, critical infrastructure protection is used in the wireless security.

Reference

DeSimone, A. & Nanda, S. (1995). Wireless data: Systems, standards, services. Wireless Netw, 1(3), 241-253. http://dx.doi.org/10.1007/bf01200844

Wireless Quality-of-Service support. (2006). Wireless Netw, 12(4), 409-410. http://dx.doi.org/10.1007/s11276-006-6541-2

Chen, W. & Lea, C. (2015). Oblivious routing in wireless mesh networks. Wireless Netw. http://dx.doi.org/10.1007/s11276-015-1092-z

Wireless Quality-of-Service support. (2006). Wireless Netw, 12(4), 409-410. http://dx.doi.org/10.1007/s11276-006-6541-2

A.P, J. & Sakthivel, U. (2015). Trends and Technologies Used for Mitigating Energy Efficiency Issues in Wireless Sensor Network. International Journal Of Computer Applications, 111(3), 32-40. http://dx.doi.org/10.5120/19521-1150

Chou, W., Chang, J., & Wu, S. (2008). Wireless Broadband Technologies: Access, Security, and Applications. IT Professional, 10(5), 12-14. http://dx.doi.org/10.1109/mitp.2008.114

Iera, A., Marano, S., & Molinaro, A. (1996). Transport and control issues in multimedia wireless networks. Wireless Netw, 2(3), 249-261. http://dx.doi.org/10.1007/bf01201058

Tsai, C., Lai, C., & Vasilakos, A. (2014). Future Internet of Things: open issues and challenges. Wireless Netw, 20(8), 2201-2217. http://dx.doi.org/10.1007/s11276-014-0731-0

David Marks

Dear sir/Ma'am

Our dedication and hard work towards developing quality content has made us competent to provide excellent services to the clients as per their needs. We ensure plagiarism free writing obeying academic integrity and honesty making us a dedicated team towards developing original content helping students to ensure high grades. Our services are hassle free, timely yet at an affordable rate driving clients to avail it for a longer period of time making them loyal and satisfied towards us.

Services we offer:
Essay writing
Report writing
Assignment writing
Reflective writing
Proposal writing
Dissertation writing
Thesis writing
CDR writing
Annotated bibliography
PowerPoint presentation
Article/book review
Why us?
Plagiarism free original content
On-time services maintaining deadlines
Experienced writers
Plagiarism and Grammarly report
Dedicate Team Leaders and Quality Checkers
Subjects we cover:
Marketing management
Human resource management
Literature
Law
Finance
Accounts
Economics
Nursing
Sociology
Environmental science
Business studies
Political science
History
Journalism and Masscommunication
Geography

Declaration: Working with us will give you the opportunity to avail divergent range of academic services at affordable rates in assistance with the dedicated team having members from different disciplines holding high degrees in their respective domains. We are experienced in developing B-plan, writing dissertations and theses having employed highly qualified and experienced writers.

You can reach us at-
Email:- ozpaperhelp@gmail.com
https://www.ozpaperhelp.com/
https://www.cheapassignmenthelp.co.uk
https://www.freeassignmenthelp.com
https://cheapassignmenthelp.blogspot.com/
Thanks
Oz Paper Help

https://www.ozpaperhelp.com/
1 Step 1
GET INSTANT ASSIGNMENT HELP
keyboard_arrow_leftPrevious
Nextkeyboard_arrow_right