1. INTRODUCTION
Nowadays for wireless networks, security represents a priority in order to assure protected communications. In IEEE 802.16, security has been considered as the main issue during the design of the protocol [1]. The Initial Network Entry procedure in an IEEE 802.16 (WiMAX) network has security defects which can be exploited by the Man-in-the-Middle (MITM) attack [2]. Improving network security in a live enterprise network with a large number of subscribers geographically dispersed should be done with minimum downtime, in order not to affect critical user data/voice services. Also the management channel should be strongly protected in order to prevent intrusion in the network core that contains all of the vital servers for network functionality.
Authentication is the validating process of a user identity and often includes validating which services a user may access and, typically involves a supplicant (that resides in the mobile station), an authenticator (that may reside in the base station or a gateway), and an authentication server [3]. EAP (Extensible Authentication Protocol) is a standard protocol (frequently used in wireless networks) for data transmission authentication, which is invoked by an 802.1X enabled NAS (Network Access Server) device such as an 802.11 a/b/g Wireless Access Point [4]. The EAP work group is developing algorithms of supporting many authentications like ID/Password, Certificates, SMART Card and methods of session key standardization using such authentication algorithms [5]. EAP (see figure 1) integrates different authentication methods (advised by IEEE) to match the nature of the communication channel, such as EAP-PKM, EAP-MD5, EAP-OTP, EAP-GTC, EAP-TLS, EAP-SIM, EAP-AKA, and in additi...
... middle of paper ...
...e for Fixed Broadband Wireless Access Systems”, IEEE Press, 2004.
[14] IEEE 802.16-2005, “IEEE Standard for Local and Metropolitan Area Networks —Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems”, IEEE Press, 2005.
[15] P. Rengaraju, L. Chung-Horng, Q. Yi and A. Srinivasan, “Analysis on mobile WiMAX security”, IEEE TIC-STH 2009, Information Assurance in Security and Privacy, Toronto, 2009.
[16] K. Scarfone, C. Tibbs and M. Sexton, “Guide to securing WiMAX wireless communications”, National Institute of Standards and Technology Special Publication, pp. 800–127, 2010.
[17] R. Dantu, G. Clothier and A. Atri, “EAP methods for wireless networks”, Computer Standard and Interfaces, vol. 29, pp. 289-301, 2007.
[18] C. T. Huang and J. M. Chang, “Responding to Security Issues in WiMAX Networks”, IT Professional, vol. 10, issue 5, pp.15 -21, 2008.
[5] S. E. Sarma, S. A. Weis, and D.W. Engels. Radio-frequency-identification security risks and challenges. CryptoBytes, 6(1), 2003.
... Network administrators and intrusion analysts need to be aware of the risks associated with 802.11 network deployment, and the techniques that can be used to identify malicious client activity.
Access (WiMax) is very important to Motorola. WiMax is an Institute of Electrical and Electronics Engineers (IEEE) standard designated 802.16e-2005 (mobile wire-less). With WiMax cell phones will no longer be tied to cellular networks. WiMax has the potential to replace a number of existing telecommunications infrastructures (WiMax, 2007).
... in Wireless Sensor Networks: Current proposal and Future Development, IEEE Xplore, Hong Kong, Oct- 2007.
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
Ishiguro, K., & Hunng, R. (2011). Implementation of a Wireless Communication Technologies Based Home Security System, IEEE
The propose research will address a problem confronting many two year institutions in the present-day (i.e. how to best plan, design, and implement WLAN technologies). While WLAN technologies offer the benefits of mobility, reduced installation time, and decreased cost, many challenges must be met by institutions deploying them (Geier, 2005). These issues are related to security, speed, interoperability, and equipment selection, ease of use, reliability, signal interference, installation, and health risks.
This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company.
With the increasingly ubiquitous nature of mobile devices and online availability, including smartphones and tablets, there is also an understandable concern about the level of security that is afforded to such devices. This can be considered as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which is being used by diverse organizations as a way of lowering the cost of ownership for such devices while also leveraging the flexibility advantages that their utilization can bring. It is therefore an area of immense interest due to the changing and emerging nature of both the technology itself as well as the security concerns.
Insecure medium- In VANET, due to broadcasting nature communication is not secure. It is hard for these networks to support different ...
Recent advances in wireless technology provide the security of blocking the attackers and also need to eliminate the attackers in the network. But in this paper providing the new technique to handle the attacker using an duplicated data as an backbone and also using dynamic key management in this system to providing the more security of the data’s in the wireless sensor network (WSN). So attackers are get confused to finds the original data’s. They don’t know the original data’s are safely send to the base station.
Thus all the users should be given appropriate training on how to use secure their data when they are at home or at the corporate premises. A combined effort of users, employers and system administrators is required in order to fight against such malicious activities. Appropriate countermeasures in every form can help the organization minimize the risk of illegal penetration. Up to date tools, constant monitoring, proper management and appropriate countermeasures are all the ultimate weapons to fight against the wireless security
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
Melford, RJ 1993, 'Network security ', The Internal Auditor, vol. 50, no. 1, p. 18.
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...