Protection In Wireless Networking – Concern and Challenges
Exploring the latest wireless technologies and their security challenges
by Rashmi Kumari*, Pushkar Raj,
- Published in International Journal of Information Technology and Management, E-ISSN: 2249-4510
Volume 7, Issue No. 9, Aug 2014, Pages 0 - 0 (0)
Published by: Ignited Minds Journals
ABSTRACT
Computer system securityhas become a major concern over the past few years. Attack, threat orintrusions, against computer system and network have become commonplace events,many system device and other tools are available to help counter the threat ofthese attack. Wireless and mobile networks are quickly becoming the networks ofchoice, not only because of large bandwidth, but due to the flexibility andfreedom they offer. Option way out to the trouble of accessing information inremote areas where wired network are inaccessible is offered by WirelessNetworking Technology. In this paper we have tried to discuss two latestwireless technologies: Wi-Fi. The objective in this paper is to describe thetechnologies as well as the benefits and risks involved in their securityimplementation.
KEYWORD
protection, wireless networking, concern, challenges, computer system security, attack, threat, intrusions, system device, tools, wireless network technology, Wi-Fi, benefits, risks, security implementation
INTRODUCTION
Wireless Networks
This hallucination of embeddable wireless connectivity has been in development for several years at AT&T Laboratories Cambridge in the context of the Piconet [6] project and is also being pursued, although with emphasis on different aspects, by several other groups including HomeRF [2,4], IrDA [1] (which uses infrared instead of radio) and Bluetooth [5,3]. Everyone including potential users knows that wireless networking is more prone to passive eavesdropping attacks. But it would be highly misleading to take this as the only, or even the main, security concern. In this paper we investigate the security issues of an environment characterized by the presence of many principals acting as network peers in intermittent contact with each other. To base the discussion on a concrete example we shall consider a wireless temperature sensor. Nearby nodes may be authorized to request the current temperature, or to register a \watch" that will cause the thermometer to send out a reading when the temperature enters a septic range Issues in accessing several different wireless networks.
Rashmi Kumari1 Pushkar Raj2
2
QOS-specified, and user-specified choices. A UAP performs protocol and frequency translation, and content adaptation. By using an overlay network, the handoffs are not performed by the user or the device but by the overlay network as the user moves from one UAP to the other. UAP stores user, network, and device information/capabilities and preferences. This architecture will support single billing and single subscription for users as UAPs can keep track of var- ious resources that have been used by a user. Accessing several wireless networks using the Common Access Protocol. This architecture can be used if wireless networks can support one or two stan- dard access protocols, and requires interworking between different networks. One possible way to sup- port this architecture is to use wireless ATM, meaning every wireless network must allow the transmission of ATM cells with additional headers (or WATM cells) requiring changes in the wireless networks.
EMERGING MOBILE AND WIRELESS NETWORKS
Mobile and wireless networks are also experiencing significant progress in the form of wireless local area networks (WLANs) [7], satellite-based networks [8], Wireless Local Loops (WLL) [9], mobile Inter- net Protocol (IP) [10], and wireless Asynchronous Transfer Mode (ATM) networks [11, 12]. A compar- ison is shown in Table 2. One emerging wireless technology is Bluetooth (www.bluetooth.net), which provides low-cost and short-range radio links for wireless connectivity among computers, printers, and scanners. Since the range is small, it can use the unlicensed ISM band in 2.4GHz.
SECURITY CHALLENGES FOR WIRELESS SENSOR NETWORKS
Wireless sensor networks processing sensitive data are facing the risks of data manipulation, data fraud and sensor destruction or replacement. This concerns applications such as the gathering of data on environmental pollution around industrial installations, or sensor systems replacing traditional video monitoring. Large-scale deployment in practice is conditioned by solving these kinds of security problem and reducing the risks due to limited physical protection of the devices and openness of the wireless communication channel. Mobile and wireless networks represent the next wave of networking because of their value in assisting an emerging mobile labor force in a growing information-oriented society. However, mobile and wireless networks also present many challenges to application, hardware, software, and network designers and several optimizations have been introduced to improve the performance of TCP/IP to make it work in slow, failure-prone, and limited bandwidth wireless networks. in addition, proxy servers have been used to improve the performance of application-specific programs (Web browsers, file systems, database servers, and so forth) and mobile users. Over the next five years, research on enabling architectures for mobile client/proxy/servers, mobile agents, and detached users will be carried out. In addition, data-centric models such as mobile and location-sensitive queries, mobile dealings, and mobile workflows are also recognized as important emerging research areas. In the near future, worldwide devices that can access the closest/best quality/cheapest wireless network out of several choices will be urbanized. Wireless net- works will be able to implement a uniform addressing system in which a person has a consistent identifying number or network address that is moveable across all wireless networks. Within two to three years, these networks will compete with “wired” networks for applications with low to medium bandwidth supplies. However, with greater than before frequency allocations, advances in semiconductor technology, and more efficient coding of information over wireless channels, mobile and wireless networks will become the net- works of choice for the majority users and applications. While modern cryptography and computer security offer many ways of solving these problems, they are focused on solutions for high-performance devices, and not for computationally weak sensors with limited communication bandwidth. New 'lightweight' solutions tailored for the special needs of wireless sensor networks have to be designed
Fig - Snapshot of a single routing path.
CONCLUSIONS
Wireless networks not only enable more efficient, scalable, and reliable wireless services but also
Rashmi Kumari1 Pushkar Raj2
previous generations. We believe, however, that future research will overcome these challenges and integrate newly developed services to new generation networks making them available to everyone, anytime and everywhere.
REFERENCES:
1. Infrared Data Association. http://www.irda.org/. 2. Home RF Working Group. http://www.homerf.org/. 3. Jaap Haartsen, Mahmoud Naghshineh, Jon Inouye, Olaf J. Joeressen, and Warren Allen. Bluetooth: Visions, goals, and architecture. ACM Mobile Computing and Communications Review, 2(4):38{45, October 1998. 4. Kevin J. Negus, John Waters, Jean Tourrilhes, Chris Romans, Jim Lansford, and Stephen Hui. Home RF and SWAP: Wireless networking for the connected home. ACM Mobile Computing and Communications Review, 2(4):28{37, October 1998. 5. Bluetooth SIG. http://www.bluetooth.com/ 6. Frazer Bennett, David Clarke, Joseph B. Evans, Andy Hopper, Alan Jones, and David Leask. Piconet: Embedded mobile networking. IEEE Personal Communications, 4(5):8{15, October 1997. 7. LaMaire, R.O., Krishna, A., and Bhagwat, P. Wireless LAN and mobile networking: Standards and future directions. IEEE Communications Magazine (Aug. 1996). 8. Miller, B. Satellites free the mobile phone. IEEE Spectrum (Mar. 1998). 9. Noerpel, A.R., and Lin, Y.-B. Wireless Local Loop: Architecture, technologies, and services. IEEE Personal Communications Magazine (June 1998). 10. Perkins, C.E. Mobile IP. IEEE Communications Magazine (May 1997). 11. Raychaudhuri, D. and Wilson, N.D. ATM-based transport architecture for multiservice wireless personal communication networks. IEEE Journal on Selected Areas in Communications (Oct. 1994). 13. http://ercim-news.ercim.eu/en76/special/security-challenges-for-wireless-sensor-networks-dynamic-routing-as-a-security-paradigm