Anda di halaman 1dari 8

WIRELESS SECURITY

AAFREEN SINGH SHILPI


STUDENT STUDENT
C.S.E DIET C.S.E DIET

ABSTRACT lower installation costs. Wireless


technologies cover a broad range of
The document addresses wireless differing capabilities oriented toward
technologies that agencies are most different uses and needs. Wireless local
likely to employ: wireless local area area network (WLAN) devices, for
networks (WLAN) and ad hoc or—more instance, allow users to move their
specifically—Bluetooth networks. The laptops from place to place within their
document also addresses the use of offices without the need for wires and
wireless handheld devices. The without losing network connectivity.
document does not address technologies Less
such as wireless radio and other WLAN wiring
standards that are not designed to the means
Institute of Electrical and Electronics greater
Engineers (IEEE) 802.11 standard. flexibility,
These technologies are out of the scope increased
of this document. efficiency,
Wireless technologies are changing and reduced
rapidly. New products and features are wiring
being introduced continuously. Many of costs. Ad
these products now offer security hoc
features designed to resolve long- networks, such as those enabled by
standing weaknesses or address newly Bluetooth, allow data synchronization
discovered ones. Yet with each new with network systems and application
capability, a new threat or vulnerability sharing between devices. Bluetooth
is likely to arise. Wireless technologies functionality also eliminates cables for
are evolving swiftly. Therefore, it is printer and other peripheral device
essential to remain abreast of the current connections. Handheld devices such as
and emerging trends in the technologies personal digital assistants (PDA) and
and in the security or insecurities of cell phones allow remote users to
these technologies. Again, this guideline synchronize personal databases
does not cover security of other types of and provide access to network services
wireless or emerging wireless such as wireless e-mail, Web browsing,
technologies such as third-generation and Internet access. Moreover, these
(3G) wireless telephony. technologies can offer dramatic cost
savings and new capabilities to diverse
INTRODUCTION applications ranging from retail settings
Wireless communications offer to manufacturing shop floors to first
organizations and users many benefits responders. However, risks are inherent
such as portability and in any wireless technology. Some of
flexibility,increased productivity, and these risks are similar to those of wired

7
networks; some are exacerbated by to connect a user’s computer to the
wireless connectivity; some are new. network, a WLAN connects computers
Perhaps the most significant source of and other components to the network
risks in wireless networks is that the using an access point device. An access
technology’s underlying point communicates with devices
communications medium, the airwave, is equipped with wireless network
open to intruders, making it the logical adaptors; it connects to a wired Ethernet
equivalent of an Ethernet port in the LAN via an RJ-45 port. Access point
parking lot. The loss of confidentiality devices typically have coverage areas of
and integrity and the threat of denial of up to 300 feet (approximately 100
service (DoS) attacks are risks typically meters). This coverage area is called a
associated with wireless cell or range. Users move freely within
communications. Unauthorized users the cell with their laptop or other
may gain access to agency systems and network device. Access point cells can
information, corrupt the agency’s data, be linked together to allow users to even
consume network bandwidth, degrade “roam” within a building or between
network performance, launch attacks buildings.
that prevent authorized users from
accessing the network, or use agency Bluetooth
resources to launch attacks on other Bluetooth has emerged as a very popular
networks. ad hoc network standard today. The
Bluetooth standard is a computing and
Wireless Standards telecommunications industry
Wireless technologies conform to a specification that describes how mobile
variety of standards and offer varying phones, computers, and PDAs should
levels of security features. The principal interconnect with each other, with home
advantages of standards are to encourage and business phones, and with
mass production and to allow products computers using short-range wireless
from multiple vendors to interoperate. connections. Bluetooth network
For this document, the discussion of applications include wireless
wireless standards is limited to the IEEE synchronization, e-mail/Internet/intranet
802.11 and the Bluetooth standard. access using local personal computer
WLANs follow the IEEE 802.11 connections, hidden computing through
standards. Ad hoc networks follow automated applications and networking,
proprietary techniques or are based on and applications that can be used for
the Bluetooth standard, which was such devices as hands-free headsets and
developed by a consortium of car kits. The Bluetooth standard
commercial companies making up the specifies wireless operation in the 2.45
Bluetooth Special Interest Group (SIG). GHz radio band and
These standards are described below. supports data rates up to 720 kbps.5 It
further supports up to three simultaneous
Wireless LANs voice channels and employs frequency-
WLANs allow greater flexibility and hopping schemes and power reduction to
portability than do traditional wired local reduce interference with other devices
area networks (LAN). Unlike a operating in the same frequency band.
traditional LAN, which requires a wire The IEEE 802.15 organization has

8
derived a wireless personal area to the network and consumes network
networking technology based on resources. Industrial and foreign
Bluetooth specifications v1.1. espionage involves gathering proprietary
data from corporations or intelligence
Wireless Security Threats information from governments through
eavesdropping. In wireless networks, the
The NIST handbook An Introduction to espionage threat stems from the relative
Computer Security generically classifies ease with which eavesdropping can
security threats in nine categories occur on radio transmissions.
ranging from errors and omissions to Attacks resulting from these threats, if
threats to personal privacy. 6 All of these successful, place an agency’s systems—
represent potential threats in wireless and, more importantly, its data—at risk.
networks as well. However, the more Ensuring confidentiality, integrity,
immediate concerns for wireless authenticity, and availability are the
communications are device theft, denial prime objectives of all government
of service, malicious hackers, malicious security policies and practices. The
code, theft of service, and industrial and information must be protected from
foreign espionage. Theft is likely to unauthorized, unanticipated, or
occur with wireless devices because of unintentional modification. Security
their portability. Authorized and requirements include the following:
unauthorized users of the system may • Authenticity—A third party must be
commit fraud and theft; however, able to verify that the content of a
authorized users are more likely to carry message has not been changed in
out such acts. Since users of a system transit.
may know what resources a system has • Non repudiation—The origin or the
and the system’s security flaws, it is receipt of a specific message must be
easier for them to commit fraud and verifiable by a third party.
theft. Malicious • Accountability—The actions of an
hackers, sometimes called crackers, are entity must be traceable uniquely to
individuals who break into a system that entity.
without authorization, usually for Network availability is “the property of
personal gain or to do harm. Malicious being accessible and usable upon
hackers are generally individuals from demand by an authorized entity.”
outside of an agency or organization
(although users within an agency or Risks in wireless networks are equal to
organization can be a threat as well). the sum of the risk of operating a wired
Such hackers may gain access to the network (as in operating a network in
wireless network access point by general) plus the new risks introduced by
eavesdropping on wireless device weaknesses in wireless protocols. To
communications. Malicious code mitigate these risks, agencies need to
involves viruses, worms, Trojan horses, adopt security measures and practices
logic bombs, or other unwanted software that help bring their risks to a
that is designed to damage files or bring manageable level.
down a system. Theft of service occurs
when an unauthorized user gains access

9
To date, the list below includes some of launching attacks and concealing
the more salient threats and their activity.
vulnerabilities of wireless systems • Interlopers, from inside or out, may
• Malicious entities may gain be able to gain connectivity to
unauthorized access to an agency’s network management controls and
computer or voice (IP telephony) thereby disable or disrupt operations.
network through wireless • Malicious entities may use a third
connections, potentially bypassing party, untrusted wireless network
any firewall protections. services to gain access to an agency’s
• Sensitive information that is not network resources.
encrypted (or that is encrypted with • Internal attacks may be possible via
poor cryptographic techniques) and ad hoc transmissions.
that is transmitted between two
wireless devices may be intercepted SECURITY MEASURES: Networks
and disclosed. to be protected
• Denial of service (DoS) attacks may
be directed at wireless connections Wireless networks are very common,
or devices. both for organisations and individuals.
• Malicious entities may steal the Many laptop computers have wireless
identity of legitimate users and cards pre-installed for the buyer. The
masquerade as them on internal or ability to enter a network while mobile
external corporate networks. has great benefits. However, wireless
• Sensitive data may be corrupted networking has many security issues.
during improper synchronization. Crackers have found wireless networks
• Malicious entities may be able to relatively easy to break into, and even
violate the privacy of legitimate use wireless technology to crack into
users and be able to track their non-wireless networks. Network
physical movements. administrators must be aware of these
risks, and stay up-to-date on any new
• Malicious entities may deploy
risks that arise. Also, users of wireless
unauthorized equipment (e.g., client
equipment must be aware of these risks,
devices and access points) to
so as to take personal protective
surreptitiously gain access to
measures.
sensitive information.
• Handheld devices are easily stolen (a) Home Wireless Threats
and can reveal sensitive information.
• Data may be extracted without The need to secure traditional wired
detection from improperly Internet connections was felt long
configured devices. before. However, there is a growing
• Viruses or other malicious code may trend of shifting to a wireless connection
corrupt data on a wireless device and at homes. This involves a process where
be subsequently introduced to a the user connects a device to his DSL or
wired network connection. cable modem that broadcasts the Internet
• Malicious entities may, through connection through the air over a radio
wireless connections, connect to signal to his computer. If traditional
other agencies for the purposes of wired connections are susceptible to

10
security tribulations, there is a great risk
of security breach that may arise when a (vii) Check internet provider’s wireless
user opens his Internet connection to the security options as it may provide
airwaves. An unsecured wireless information about securing your home
network coupled with unsecured file wireless network,
sharing can be disastrous. There are,
however, steps one can take to protect (viii) Do not auto-connect to open Wi-Fi
the wireless network. (wireless fidelity) networks

The following are some of the possible (ix) Turn off the network during
security steps: extended periods of non-use, etc.

(i) Make the wireless network invisible (b) Public Wireless Threats
by disabling identifier broadcasting,
The risks to users of wireless technology
(ii) Rename the wireless network and have increased exponentially as the
change the default name. service has become more popular.
Currently, however; there are a great
(iii) Encrypt the network traffic, number of security risks associated with
wireless technology. Some issues are
obvious and some are not. At a corporate
level, it is the responsibility of the
Information Technology (IT) department
to keep up to date with the types of
threats and appropriate counter measures
to deploy. Security threats are growing
in the wireless arena. Crackers have
learned that there is much vulnerability
in the current wireless protocols,
encryption methods, and in the
carelessness and ignorance that exists at
the user and corporate IT level. Cracking
methods have become much more
sophisticated and innovative with
(iv) Change administrator’s password wireless. Cracking has become much
from the default password. If the easier and more accessible with easy-to-
wireless network does not have a default use Windows-based and Linux-based
password, create one and use it to protect tools being made available on the web at
the network, no charge. IT personnel should be
somewhat familiar with what these tools
(v) Use file sharing with caution. If the can do and how to counteract the
user does not need to share directories cracking that stems from them.
and files over his network, he should Accessing the internet via a public
disable file sharing on his computers. wireless access point involves serious
security threats. These threats are
(vi) Keep the access point software compounded by the inability to control
patched and up to date,

11
the security setup of the wireless proprietary company information is
network. The following steps can be exposed and now there could exist a link
taken to protect oneself at public places: from one company to the other. This is
especially true if the laptop is also
(a) Be careful while dealing in an online hooked to a wired network.
environment if the network is not
properly secured. Avoid online banking, (b) Malicious Association: “Malicious
shopping, entering credit card details, associations” are when wireless devices
etc, can be actively made by crackers to
connect to a company network through
(b) Connect using a virtual private their cracking laptop instead of a
network (VPN) as it allows connecting company access point (AP). These types
securely. VPNs encrypt connections at of laptops are known as “soft APs” and
the sending and receiving ends, and keep are created when a cracker runs some
out traffic that is not properly encrypted, software that makes his/her wireless
network card look like a legitimate
(c) Disable file sharing in public wireless access point. Once the cracker has
spaces as it is more dangerous than it is gained access, he/she can steal
on your home wireless network, passwords, launch attacks on the wired
network, or plant trojans.
(d) Be aware of your surroundings while
using a public wireless access point. If
an internet connection is not essential,
disable wireless networking altogether.

III. Corporate security


The network of companies are equally
vulnerable to various cyber attacks and if
not properly secured may cost the
company tremendous loss of information
and money. The following are the types
of unauthorised access generally found
(c) Ad-Hoc Networks: Ad-hoc networks
at companies networks:
can pose a security threat. Ad-hoc
networks are defined as peer to peer
(a) Accidental Association: Unauthorised
networks between wireless computers
access to company wireless and wired
that do not have an access point in
networks can come from a number of
between them. While these types of
different methods and intents. One of
networks usually have little security,
these methods is referred to as
encryption methods can be used to
“accidental association”. This is when a
provide security.
user turns on their computer and it
latches on to a wireless access point
(d) Non-Traditional Networks: Non-
from a neighboring company’s
traditional networks such as personal
overlapping network. The user may not
network Bluetooth devices are not safe
even know that this has occurred.
from cracking and should be regarded as
However, this is a security breach in that
a security risk. Even bar code scanners,

12
handheld PDAs,and wireless printers off due to freeware such as LANjack and
and copiers should be secured. These AirJack automating multiple steps of the
non-traditional networks can be easily process. What was once done by cutting
overlooked by IT personnel that have edge crackers can now be done by less
narrowly focused on laptops. knowledgeable and skilled crackers
sitting around public and private
(e) Identity Theft (MAC Spoofing): hotspots. Hotspots are particularly
Identity theft occurs when a cracker is vulnerable to any attack since there is
able to listen in on network traffic and little to no security on these networks.
identify the MAC address of a computer
with network privileges. Most wireless (g) Denial of Service: A Denial-of-
systems allow some kind of MAC service attack occurs when an attacker
filtering to only allow authorised continually bombards a targeted AP or
computers with specific MAC IDs to network with bogus requests, premature
gain access and utilize the network. successful connection messages, failure
However, a number of programs exist messages, and/or other commands.
that have network “sniffing” capabilities. These cause legitimate users to not be
Combine these programs with able to get on the network and may even
capabilities. Combine these programs cause the network to crash. These
with other software that allow a attacks rely on the abuse of protocols
computer to pretend it has any MAC such as the Extensible Authentication
address that the cracker desires, and the Protocol (EAP).
cracker can easily get around that hurdle.
(h) Network Injection: The final attack
(f) Man-In-The-Middle Attacks: A man- to be covered is the network injection
in-the-middle attack is one of the more attack. A cracker can make use of AP
sophisticated attacks that have been points that are exposed to non-filtered
cleverly thought up by crackers. This network traffic. The cracker injects
attack revolves around the attacker bogus networking re-configuration
enticing computers to log into his/her commands that affect routers, switches,
computer which is set up as a soft AP. and intelligent hubs. A whole network
Once this is done, the cracker connects can be brought down in this manner and
to a real access point through another require rebooting or even
wireless card offering a steady flow of reprogramming of all intelligent
traffic through the transparent cracking networking devices.
computer to the real network. The
cracker can then sniff the traffic for user Conclusion
names, passwords, credit card
numbers...etc. One type of man-in-the- The growing penetration of Internet in
middle attack relies on security faults in the day to day affairs of Indian society
challenge and handshake protocols. It is has both positive and negative effects.
called a “de-authentication attack”. This The positive side of this is the advent of
attack forces AP-connected computers to e-governance and e-commerce in India.
drop their connections and reconnect The use of e-governance will provide a
with the cracker’s soft AP. Man-in-the- transparent, accountable and hassle free
middle attacks are getting easier to pull citizen and Government interaction.

13
Similarly, e-commerce is also facilitated establish a base that is unsuitable to
with the use of ICT. The e-commerce is Indian conditions. The ICT strategy of
a well known phenomenon of the global India must be “futuristic” in nature that
trade that is gaining momentum in India. must anticipate and adopt future
However, neither e-governance nor e- developments and trends. We are
commerce can be a success in India till following those trends that have been
we also secure these infrastructures. Any discarded long before by developed
ICT infrastructure is ineffective till we countries. We must concentrate on
are capable of securing and protecting it. “originality” and devote our time, money
It must be appreciated that the ICT and energy to security and forensics
infrastructure of a nation can exist only researches rather than blindly following
to the extent it can be protected from foreign standards. It is high time for
internal and external online attacks. This “innovation” and “futuristic efforts” and
“need” becomes a “compulsion” due to giving a final farewell to dependence
the provisions of IT Act, 2000 that fixes upon standards and technology left by
both civil and criminal liability for developed nations.
failure to act diligently. Both the citizens
and companies are required to establish a REFERENCES
sound and secure ICT infrastructure to 1. http://www.zdnetindia.com (ZDNet
escape the accusation of lack of “due India Magazine Web site provides
diligence”. The need of the hour is to white papers, surveys, and reports on
secure both home based and publicly wireless network security)
situated wireless networks. The same 2. Wireless Network Security 802.11,
cannot be a reality in India till we take Bluetooth and Handheld Devices
immediate steps in this direction. Every Tom Karygianni ,Les Owens
base needs time to mature and its 3. Norton, P., and Stockman,
deficiencies can be removed only after it M.Peter Norton’s Network Security
is established and analysed. It is futile to Fundamentals.
wait for several years and then adopt and

14

Anda mungkin juga menyukai