Abstract
Wireless-the name says it all: ”Cut the cord”. Today there is no hotter area of development than wireless networking. Enterprizes are rapidly adopting wireless local area networks (WLANs). Driving this rapid adoption is the low-cost and inherent convenience of rapidly deployed connectivity solutions, which are not burdened by a wired infrastructure. WLAN have been in the news quite a lot, recently both from the perspective of growing popularity and in terms of security vulnerabilities that have been discovered in the wired equivalent privacy (WEP) security standard, which is supposed to ensure the security of data that flows over the networks. While wireless LANs are convenient and provide immediate connectivity, they also impose unique management, security, and mobility challenges on network. Though “connect anywhere at anytime” promise of the wireless networks is beginning to become popular; there are a plenty of confusion among prospective users when it comes to security. Because WLAN impose such significant challenges, should all 802.11 networks be considered hostile to the prospective user? Not necessarily. A well-designed wireless LAN ensures that the network is well protected and easy to manage, without sacrificing the wireless user’s ability to roam seamlessly. This is a survey paper that focuses on the catalog of security risks and countermeasures of the wireless network. We describe the standard mechanisms available for authentication of users and the protection of the privacy and integrity of the data. A basic analysis of each security countermeasure is conducted by looking at the attack techniques addressed by the mechanism. Our analysis takes into account the perspective of both insiders and outsiders.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Stallings, W.: Wireless Communication & Networks. Prentice Hall, New Jersey (2001)
Ferguson, N., Schneier, B.: A Cryptographic Evaluation of IPsec. Counterpane InternetSecurity White Paper (1999)
Potter, B.: 802.1x: What it is, how its broken, and How to fix it. In: Black Hat 2002, Las Vegas, NV (2002)
Krishnamurthy, P., Kabara, J., Amornkul, T.A.: Security inWireless Residential Networks. IEEE Transactions on Consumer Electronics 48(1), 157–166 (2002)
Fratto, S.: Mike: Mobile & Wireless Technology Tutorial. Wireless Security in Network Computing, CMP United Business Media (2001)
Mishra, A., Arbaugh, W.: An Initial Security Analysis of The IEE 802.1X Standard, University of Maryland Institute for Advanced Computer Studies Technical Report CS-TR-4328 and UMIACS-TR (2002)
Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. In: proc of the Seventh International Conference on Mobile Computing and Networking (2001)
Cisco Systems. Wireless LAN Enterprise Campus with Multi-Site Branch Offices, http://www.cisco.com
Matthew, G.: A Technical Comparison of TTLS and PEAP. The O’Reilly Network White Paper (2002)
O’Hara, B., Petrick, A.: IEEE 802.11 Handbook: A Designers Companion. IEEE Press, New York (1999)
Stallings, W.: IEEE 802.11: Moving closer to Practical wireless LANs. IT Pro. 152, 17–23 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nagamalai, D., Dhinakaran, B.C., Sasikala, P., Lee, SH., Lee, JK. (2005). Security Threats and Countermeasures in WLAN. In: Cho, K., Jacquet, P. (eds) Technologies for Advanced Heterogeneous Networks. AINTEC 2005. Lecture Notes in Computer Science, vol 3837. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599593_13
Download citation
DOI: https://doi.org/10.1007/11599593_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30884-3
Online ISBN: 978-3-540-32292-4
eBook Packages: Computer ScienceComputer Science (R0)