Security
Security
53-68
ISSN 2320–088X
SURVEY ARTICLE
A SURVEY OF WIRELESS
NETWORK SECURITY
S. Gopalakrishnan
Assistant Professor, Department of ECE, PSNA college of Engineering and Technology,
Dindigul, Tamil Nadu, India
[email protected]
ABSTRACT
GFGDFGDFGDFG ABSTAAAAR
Wireless networking is inherently insecure. From jamming to eavesdropping, from
man-in the middle to spoofing, there are a variety of attack methods that can be used
against the users of wireless networks. Modern wireless data networks use a variety of
cryptographic techniques such as encryption and authentication to provide barriers to
such infiltrations. However, much of the commonly used security precautions are
woefully inadequate. They seem to detract the casual sniffer, but are unable to stop the
powerful adversary. In this article, we look into the technology and the security schemes
in IEEE 802.11, cellular and Bluetooth wireless transport protocols. We conclude that the
only reliable security measure for such networks is one hat is based on application level
security such as using a VPN.The wireless communication technology also acquires
various types of security threats. This paper discusses a wide variety of attacks in WSN
and their classification mechanisms and different securities available to handle them
including the challenges faced.
WIRELESS NETWORKS
Wireless networks serve as the transport mechanism between devices and among devices
and the traditional wired networks (enterprise networks and the Internet). Wireless
networks are many and diverse but are frequently categorized into three groups based on
their coverage range: Wireless Wide Area Networks (WWAN), WLANs, and Wireless
Personal Area Networks (WPAN). WWAN includes wide coverage area technologies
such as 2G cellular, Cellular Digital Packet Data (CDPD) and Global System for Mobile
Communications (GSM), and Mobitex. WLAN, representing wireless local area
networks, includes 802.11, HiperLAN, and several others. WPAN represents wireless
personal area network technologies such as Bluetooth and IR. All of these technologies
are “tether less”—they receive and transmit information using electromagnetic (EM)
waves. Wireless technologies use wavelengths ranging from the radio frequency (RF)
band up to and above the IR band. The frequencies in the RF band cover a significant
portion of the EM radiation spectrum, extending from 9 kilohertz (kHz), the lowest
allocated wireless communications frequency, to thousands of gigahertz (GHz). As the
frequency is increased beyond the RF spectrum, EM energy moves into the IR and then
the visible spectrum. Wireless networks allow devices to be moved about with varying
degrees of freedom and still maintain communication with each other. They also offer
greater flexibility than cabled networks and significantly reduce the time and resources
needed to set up new networks and allow for ad hoc networks to be easily created,
modified or torn down. There are many forms of wireless networks. One way of
categorizing wireless networks is to consider the relative range and complexity of each
type of network. For example:
WIRELESS PERSONAL AREA NETWORK (WPAN) – a small-scale wireless
network that requires little or no infrastructure and operates within a short range. A
WPAN is typically used by a few devices in a single room instead of connecting the
devices with cables. Examples include print services or enabling a wireless keyboard or
mouse to communicate with a computer.
WIRELESS LAN:
WLANs allow greater flexibility and portability than do traditional wired local area
networks (LAN).Unlike a traditional LAN, which requires a wire to connect a user’s
computer to the network, a WLAN connects computers and other components to the
network using an access point device. An access point communicates with devices
equipped with wireless network adaptors; it connects to a wired Ethernet LAN via an RJ-
45 port. Access point devices typically have coverage areas of up to 300
feet(approximately 100 meters). This coverage area is called a cell or range. Users move
freely within the cell with their laptop or other network device. Access point cells can be
linked together to allow users to even “roam” within a building or between buildings.
AD HOC NETWORKS:
Ad hoc networks such as Bluetooth are networks designed to dynamically connect remote
devices such as cell phones, laptops, and PDAs. These networks are termed “ad hoc”
because of their shifting network topologies. Whereas WLANs use a fixed network
infrastructure, ad hoc networks maintain random network configurations, relying on a
master-slave system connected by wireless links to enable devices to communicate. In a
Bluetooth network, the master of the piconet controls the changing network topologies of
these networks. It also controls the flow of data between devices that are capable of
supporting direct links to each other. As devices move about in an unpredictable fashion,
these networks must be reconfigured on the fly to handle the dynamic topology. The
routing that protocol Bluetooth employs allows the master to establish and maintain these
shifting networks.
phrase should be changed regularly, which may or may not be practical depending on the
size of the network.
LEVEL-4-APPLICATION SECURITY
Best practices for application security include:
• Implement an application-level user authentication system.
• Maintain and enforce permissions and password policies.
• Install vendor patches as they become available.
The 802.11 standard provides a number of options for authentication. Here we discuss the
two that provide the most protection from unauthorized users.
This is the most basic security authentication mechanism for 802.11 networks. The SSID
can be used as a shared secret; however, as a security mechanism it is virtually worthless.
In its most secure configuration the access point will not respond to probe requests. This
gives the illusion of maintaining the SSID as a shared secret. In reality, the SSID is
transmitted unencrypted. An attacker can use passive eavesdropping to discover the
SSID, or if she is impatient, she can use an active attack. To actively attack a WLAN
using SSID as a shared secret the attacker sends a forged disassociates message to the
target and then eavesdrops as the target automatically begins to reassociate with an
authentication transaction. There is some indication that some administrators have used
this in an attempt to restrict unauthorized users but it is only effective against the most
unskilled attacker.
encryption can be defeated passively when the key stream is reused. Because the WEP
initialization Vector (IV) is only 24 bits, reuse can occur quite frequently even in a well
implemented version of WEP.
AD HOC MODE. The ad hoc mode does not use APs. Ad hoc mode is sometimes
referred to as infrastructure less because only peer-to-peer STAs are involved in the
communications. This mode of operation is possible when two or more STAs are able to
communicate directly to one another. Examples are laptops, mobile phones, PDAs,
printers and scanners being able to communicate with each other without an AP. One of
the key advantages of ad hoc WLANs is that theoretically they can be formed any time
and anywhere, allowing multiple users to create wireless connections cheaply, quickly,
and easily with minimal hardware and user maintenance. However, an ad hoc WLAN
cannot communicate with external networks. A further complication is that an ad hoc
network can interfere with the operation of an AP-based infrastructure mode network that
exists within the same wireless space.
802.11 ARCHITECTURE
The IEEE 802.11 standard permits devices to establish either peer-to-peer (P2P)
networks or networks based on fixed access points (AP) with which mobile nodes can
communicate. Hence, the standard defines two basic network topologies: the
infrastructure network and the ad hoc network. The infrastructure network is meant to
extend the range of the wired LAN to wireless cells. A laptop or other mobile device may
move from cell to cell (from AP to AP) while maintaining access to the resources of the
LAN. A cell is the area covered by an AP and is called a “basic service set” (BSS). The
collection of all cells of an infrastructure network is called an extended service set (ESS).
This first topology is useful for providing wireless coverage of building or campus areas.
By deploying multiple APs with overlapping coverage areas, organizations can achieve
broad network coverage. WLAN technology can be used to replace wired LANs totally
and to extend LAN infrastructure. A WLAN environment has wireless client stations that
use radio modems to communicate to an AP. The client stations are generally equipped
with a wireless network interface card (NIC) that consists of the radio transceiver and the
logic to interact with the client machine and software. An AP comprises essentially a
radio transceiver on one side and a bridge to the wired backbone on the other. The AP, a
stationary device that is part of the wired infrastructure, is analogous to a cell-site (base
station) in cellular communications. All communications between the client stations and
between clients and the wired network go through the AP. The basic topology of a
WLAN is depicted in Figure
Although most WLANs operate in the “infrastructure” mode and architecture described
above, another topology is also possible. This second topology, the ad hoc network, is
meant to easily interconnect mobile devices that are in the same area (e.g., in the same
room). In this architecture, client stations are grouped into a single geographic area and
can be Internet-worked without access to the wired LAN (infrastructure network). The
interconnected devices in the ad hoc mode are referred to as an independent basic service
set (IBSS). The ad hoc topology is depicted in Figure.
BENEFITS
WLANs offer four primary benefits:
USER MOBILITY-Users can access files, network resources, and the Internet without
having to physically connect to the network with wires. Users can be mobile yet retain
high-speed, real-time access to the enterprise LAN.
RAPID INSTALLATION-The time required for installation is reduced because network
connections can be made without moving or adding wires, or pulling them through walls
or ceilings, or making modifications to the infrastructure cable plant. For example,
WLANs are often cited as making LAN installations possible in buildings that are subject
to historic preservation rules.
FLEXIBILITY-Enterprises can also enjoy the flexibility of installing and taking down
WLANs in locations as necessary. Users can quickly install a small WLAN for temporary
needs such as a conference, trade show, or standards meeting.
SCALABILITY-WLAN network topologies can easily be configured to meet specific
application and installation needs and to scale from small peer-to-peer networks to very
large enterprise networks that enable roaming over a broad area.
Because of these fundamental benefits, the WLAN market has been increasing steadily
over the past several years, and WLANs are still gaining in popularity. WLANs are now
becoming a viable alternative to traditional wired solutions. For example, hospitals,
universities, airports, hotels, and retail shops are already using wireless technologies to
conduct their daily business operations.
AUTHENTICATION
The IEEE 802.11 specification defines two means to “validate” wireless users attempting
to gain access to a wired network: open-system authentication and shared-key
authentication. One means, shared-key authentication, is based on cryptography, and the
other is not. The open-system authentication technique is not truly authentication; the
access point accepts the mobile station without verifying the identity of the station. It
should be noted also that the authentication is only one-way: only the mobile station is
authenticated. The mobile station must trust that it is communicating to a real AP.
PRIVACY
The 802.11 standard supports privacy (confidentiality) through the use of cryptographic
techniques for the wireless interface. The WEP cryptographic technique for
confidentiality also uses the RC4 symmetric key, stream cipher algorithm to generate a
pseudo-random data sequence. This “key stream” is simply added modulo 2 (exclusive-
OR-ed) to the data to be transmitted. Through the WEP technique, data can be protected
from disclosure during transmission over the wireless link. WEP is applied to all data
above the 802.11 WLAN layers to protect traffic such as Transmission Control
Protocol/Internet Protocol (TCP/IP), Internet Packet Exchange (IPX), and Hyper Text
Transfer Protocol (HTTP).The WEP privacy is illustrated conceptually in Figure7.
INTEGRITY
The IEEE 802.11 specification also outlines a means to provide data integrity for
messages transmitted between wireless clients and access points. This security service
was designed to reject any messages that had been changed by an active adversary “in the
middle.” This technique uses a simple encrypted Cyclic Redundancy Check (CRC)
approach. As depicted in the diagram above, a CRC-32, or frame check sequence, is
© 2014, IJCSMC All Rights Reserved 64
S. Gopalakrishnan, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.1, January- 2014, pg. 53-68
LOSS OF CONFIDENTIALITY
Confidentiality is the property with which information is not made available or disclosed
to unauthorized individuals, entities, or processes. This is, in general, a fundamental
security requirement for most organizations. [5],Due to the broadcast and radio nature of
wireless technology, confidentiality is a more difficult security requirement to meet in a
wireless network. WLANs risk loss of confidentiality following an active attack as well.
Sniffing software as described above can obtain user names and passwords (as well as
any other data traversing the network) as they are sent over a wireless connection. An
adversary may be able to masquerade as a legitimate user and gain access to the wired
network from an AP. Once “on the network,” the intruder can scan the network using
purchased or publicly and readily available tools. The malicious eavesdropper then uses
the user name, password, and IP address information to gain access to network resources
and sensitive corporate data.
LOSS OF INTEGRITY
Data integrity issues in wireless networks are similar to those in wired networks. Because
organizations frequently implement wireless and wired communications without adequate
cryptographic protection of data, integrity can be difficult to achieve. A hacker, for
example, can compromise data integrity by deleting or modifying the data in an e-mail
from an account on the wireless system. This can be detrimental to an organization if
important e-mail is widely distributed among e-mail recipients. Because the existing
security features of the 802.11 standard do not provide for strong message integrity, other
kinds of active attacks that compromise system integrity are possible. As discussed
before, the WEP based integrity mechanism is simply a linear CRC. Message
modification attacks are possible when cryptographic checking mechanisms such as
message authentication codes and hashes are not used.[6]
COUNTERMEASURES
Organizations can mitigate risks to WLANs by applying countermeasures to address
specific threats and vulnerabilities. Countermeasures at the management, operational and
technical levels can be effective in reducing the risks commonly associated with WLANs.
MANAGEMENT COUNTERMEASURES:
OPERATIONAL COUNTERMEASURES:
Physical security is a fundamental step for ensuring that only authorized users have
access to wireless equipment. Physical security combines such measures as access
controls, personnel identification, and external boundary protection. As with facilities
housing wired networks, facilities providing wireless network connectivity need physical
access controls. It is important to consider the range of each AP that will be deployed as
part of a WLAN environment. [8] Design for security: when placing wireless APs for
strategic coverage, consider signal bleed into uncontrolled areas where transmissions may
be intercepted. If the range extends beyond the physical boundaries of the building's
walls, the extension creates security vulnerability.
TECHNICAL COUNTERMEASURES:
Technical countermeasures involve the use of hardware and software solutions to help
secure the wireless environment. Software countermeasures include proper Access Point
configurations (i.e. the operational and security settings on an AP), software patches and
upgrades, authentication, intrusion detection systems, personal firewalls for wireless
devices, and encryption.[9] Hardware solutions include smart cards, virtual private
networks (VPNs), public key infrastructure (PKI), a separate switching infrastructure for
the wireless network (separating it from a wired network), and biometrics. It should be
noted that hardware solutions, which generally have software components, are listed
simply as hardware solutions.[10].
© 2014, IJCSMC All Rights Reserved 67
S. Gopalakrishnan, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.1, January- 2014, pg. 53-68
CONCLUSION
Wireless networking provides numerous opportunities to increase productivity and cut
costs. It also alters an organization’s overall computer security risk profile. Although it is
impossible to totally eliminate all risks associated with wireless networking, it is possible
to achieve a reasonable level of overall security by adopting a systematic approach to
assessing and managing risk. This paper discussed the threats and vulnerabilities
associated with each of the three basic technology components of wireless networks
(clients, access points, and the transmission medium) and described various commonly
available countermeasures that could be used to mitigate those risks. A combined effort
of users, employers and system administrators is required in order to fight against such
malicious activities. Appropriate countermeasures in every form can help the
organization minimize the risk of illegal penetration. Up to date tools, constant
monitoring, proper management and appropriate countermeasures are the ultimate
weapons to fight against wireless security attacks.
References
[1] Mitchell Ashley , “A Guide to Wireless Network Security” Information systems Control Journal
,Volume 3,2004.
[2] Karen Scarfone, Derric Dicoi, “ Wireless Network Security for IEEE
802.11a/b/g,Bluetooth(DRAFT)”,NISTPublication-800-48.Augest 2007.
[3] Tom karygiannis, Les Owens, “Wireless Network Security for IEEE
802.11a/b/g,Bluetooth(DRAFT)”,NISTPublication-800-48.November 2002
[4] Ahmed M. Al Naamany , Ali Al Shidhani, Hadj Bourdoucen, “IEEE 802.11 Wireless LAN Security
Overview”, IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May
2006.
[5] Omar Cheikhrouhou & Maryline Laurent & Amin Ben Abdallah & Maher Ben Jemaa, “An EAP-EHash
authentication method adapted to resource constrained terminals”, Institute TELECOM and Springer-
Verlag.Hal-00506549,Version 1-28 July 2010
[6] “Applied Cryptographhy” By Bruse Schneier.
[7]“AdvancedComputing Applications,Data bases and Networks” By Shahin Ara Begum,Prodipto
Das.
[8] John Vollbrech, Robert Moskowitz, “Wireless LAN Access Control and Authentication” Interlink
networks-2002.
[9] “Cryptography and Network Security” By William Stallings
[10]http://www.practicallynetworked.com/support/mixed_wep.htm
Author Biography:
GOPALAKRISHNAN S was born in Tamil Nadu, India, in 1985. He received the B.E.
degree in Electronics and Communication Engineering from PET Engineering College
affiliated to Anna University Chennai and the M.E. degree in Embedded System
Technologies from SA Engineering College affiliated to Anna University Chennai, India
in 2011. He is currently pursuing the Ph.D. degree from the Department of Information
Communication Engineering Anna University, Chennai. He is working as a Assistant
Professor in PSNA College of Engineering and Technology, Dindigul, TamilNadu, India.
His research interests include computer vision and computer Networks.