Wireless Network Security: Susceptibilities, Extortion and kiosk

Authors

  • Mohd Amjad Deptt. Of Computer Engineering, F/o Engg. & Technology, Jamia Millia Islamia, New Delhi

Keywords:

Wireless Network, Wireless Security, Wireless Threats, WEP, RC4, AES, IEEE 802.11, WPA

Abstract

Wireless networking brings a whole new meaning to network security risk analysis and mitigation. With readily available equipment, attacks on wireless networks are very easy. The wireless security mechanism is not same as in wired networks. Because there is no user controlling for each individual node, wireless environment, and more importantly, scarce energy resources. The wireless security mechanism is not same as in wired networks. Because there is no user-controlling for each individual node, wireless environment, and more importantly, scarce energy resources. This paper looks at the basic risks inherent in wireless networking security protects a wireless network by denying access to the network itself before a user is successfully authenticated. This paper proposed a new security model which addresses three important types of active attacks like Rushing attack, Black hole and Replay attack. By using 3-roundof well known AES algorithm we implement this model. Thus it is easy for the administrator to identify these attacks using WPA. Different types of attack there related information, different cryptographic strength and performance of the proposed model get analyzed in this system. One particularly important improvement over the WPA standards is the inclusion of the Advanced Encryption Standard (AES) which could be used in many rounds to protect the overall network from the external attacks.

References

. B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks,” Proc. IEEE Symposium. Security and Privacy, pp. 49-63, May 2005

. Kai Xing Fang, Liu Xiuzhen, Cheng David, H. C. Du, Real-Time Detection of Clone Attacks in Wireless Sensor Networks Proceedings of the 28th International Conference on Distributed Computing Systems, 2008, Pages 3-10.

. Klempous R.; Nikodem J.; Radosz, L.; Raus, N. Byzantine Algorithms in Wireless Sensors Network, Wroclaw Univ. of Technology .,Wroclaw; Information and Automation, 2006. ICIA2006.International Conference on, 15-17 Dec. 2006, pages :319-324

. Mehmet Ulema and Barcin Kozbe, “Management of Next-generation Wireless Networks and Services”, IEEE Communications Managing, February 2003.

. B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks,” Proc. IEEE Symposium. Security and Privacy, pp. 49-63, May 2005.

. Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Communication. Surveys Tutorials, vol. 8, pp. 2–23, year 2006

. Security in Mobile Ad Hoc Networks: Challenges and Solutions H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang IEEE Wireless Communications, Vol.11, Issue 1, pp. 38-47, 2004

. Fluhrer, S., Mantin, I. and Shamir, A. 2001. Weaknesses in the Key Scheduling Algorithm of RC4, Selected Areas in Cryptography 2001, Lecture Notes in Computer Science, Vol. 2259, pp. 1-24. Springer.

. Mead, N.R. and McGraw, G. 2003. Wireless Security’s Future, IEEE Security and Privacy, 1 (4), pp. 68-72.

. Joseph Binder, Hans Peter Bischof, Zero Knowledge Proofs of Identityfor Ad Hoc Wireless Networks An In-Depth Study Technical Report, 2003

Downloads

Published

2013-11-30

How to Cite

[1]
M. Amjad, “Wireless Network Security: Susceptibilities, Extortion and kiosk”, Int. J. Comp. Sci. Eng., vol. 1, no. 3, pp. 10–14, Nov. 2013.

Issue

Section

Research Article