Security threats and countermeasures in WLAN

  • Authors:
  • Dhinaharan Nagamalai;Beatrice Cynthia Dhinakaran;P. Sasikala;Seoung-Hyeon Lee;Jae-Kwang Lee

  • Affiliations:
  • Department of Computer Engineering, Hannam University, Daejeon, South Korea;Department of Computer Science and Engineering, Woosong University, Daejeon, South Korea;Department of Computer Science and Engineering, Woosong University, Daejeon, South Korea;Department of Computer Engineering, Hannam University, Daejeon, South Korea;Department of Computer Engineering, Hannam University, Daejeon, South Korea

  • Venue:
  • AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Wireless-the name says it all: ”Cut the cord”. Today there is no hotter area of development than wireless networking. Enterprizes are rapidly adopting wireless local area networks (WLANs). Driving this rapid adoption is the low-cost and inherent convenience of rapidly deployed connectivity solutions, which are not burdened by a wired infrastructure. WLAN have been in the news quite a lot, recently both from the perspective of growing popularity and in terms of security vulnerabilities that have been discovered in the wired equivalent privacy (WEP) security standard, which is supposed to ensure the security of data that flows over the networks. While wireless LANs are convenient and provide immediate connectivity, they also impose unique management, security, and mobility challenges on network. Though “connect anywhere at anytime” promise of the wireless networks is beginning to become popular; there are a plenty of confusion among prospective users when it comes to security. Because WLAN impose such significant challenges, should all 802.11 networks be considered hostile to the prospective user? Not necessarily. A well-designed wireless LAN ensures that the network is well protected and easy to manage, without sacrificing the wireless user’s ability to roam seamlessly. This is a survey paper that focuses on the catalog of security risks and countermeasures of the wireless network. We describe the standard mechanisms available for authentication of users and the protection of the privacy and integrity of the data. A basic analysis of each security countermeasure is conducted by looking at the attack techniques addressed by the mechanism. Our analysis takes into account the perspective of both insiders and outsiders.