Wireless LAN security and laboratory designs

  • Authors:
  • Yasir Zahur;T. Andrew Yang

  • Affiliations:
  • University of Houston Clear Lake, Houston, TX;University of Houston Clear Lake, Houston, TX

  • Venue:
  • Journal of Computing Sciences in Colleges
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

For the past couple of years, increasing number of wireless local area networks (WLANs), based on the IEEE 802.11 protocols, have been deployed in various types of locations, including homes, schools, airports, business offices, government buildings, military facilities, coffee shops, book stores, as well as many other venues. One of the primary advantages offered by WLAN is its ability to provide untethered connectivity to portable devices, such as wireless laptops and PDAs. In some remote communities, WLANs are implemented as a viable last-mile technology [4], which link homes and offices in isolated locations to the global Internet. The further widespread deployment of WLANs, however, depends on whether secure networking can be achieved. In order for critical data and services to be delivered over WLANs, reasonable level of security must be guaranteed. The WEP (Wired Equivalent Privacy) protocol, originally proposed as the security mechanism of 802.11b WLANs, is known to be easily cracked by commonly available hacking software. Alternative security mechanisms, such as SSL, VPN, Cisco's LEAP, 802.1x, and the being-developed 802.11i protocols, provide mechanisms to enhance security in WLANs. In this paper we study the security aspects of WLANs, by starting with an overview of the WLAN technology and the respective vulnerabilities of various protocols, followed by a discussion of alternative security mechanisms that may be used to protect WLANs. At the end we present a sequence of laboratory designs, which are used as platforms on which attacks at WLANs can be simulated and studied, and alternative security solutions can be implemented and tested.