Open Access Open Access  Restricted Access Subscription or Fee Access

An Overview of Wireless Network System

Abhishek Badholia, Vijayant Verma, Sanjay Kalkal, Sunil Kumar Kashyap

Abstract


The wireless network system (WNS) is reviewed in this study. The review is performed over the efficiency and security. New dimensions of WNS are proposed to improve the existed WNS that is also presented in this study. The frontiers of WNS are studied dynamically for proposing new WNS. The comparison of classical and modern WNS is presented over the existed problems and probable solutions. The applications of WNS are mapped to corresponding properties. Development, generalization, analysis and application are the key factors of this study, which are analyzed to propose some new WNSs.

Keywords: WNS, communication system, LAN, WAN, PAN

Full Text:

PDF

References


Welch J, Lathrop SD. A Survey of 802.11a Wireless Security Threats and Security Mechanisms. New York: United States Military Academy West Point; 2003. Available from: http://www.itoc.usma.edu/documents/itoc tr-2003-101 (g6).

Fleck B, Dimov J. (2001). Wireless access points and ARP poisoning: wireless vulnerabilities that expose the wired network. White Paper by Cigital Inc. Available from: http://www.cigitallabs.com/resources/papers/download/arppoison.

I. Martinovic FA. Zdarsky A Bachorek, C Jung, JB Schmitt. (2006). Phishing in the wireless: implementation and analysis. Kaiserslauterer Uniweiter Elektronischer Dokumentenserver, Universitatsbibliothek Kaiserslautern. Available from: http://kluedo.ub.uni-kl.de/volltexte/2006/2035/pdf/martinovic.

Rupinde G, Jason S, Andrew C. Specification based intrusion detection in WIANS. 22nd Annual Computer Security Applications Conference, Miami Beach, FL. 2006.

Wullems C, Tham K, Smith J, Looi M. A Trivial Denial of Service Attack on IEEE 802.11 Direct Sequence Spread Spectrum Wireless LANS. IEEE Press; 2004, pp. 129–136.

Rango F, Lentini DC, Marano S. Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i. Hindawi Publishing Corporation; 2006, pp. 1–19.

Prodanovic R, Simic D. Holistic approach to WEP protocol in securing wireless network infrastructure. Com Sis. 2006; 3(2): 97–113pp.

Borisov N, Goldberg I, Wagner D. (2002). Intercepting Mobile Communications: The Insecurity of 802.11. Draft. Available from: http://www.isaac.cs.berkeley.edu/isaac/ wep-draft.pdf

Walker JR. Unsafe at Any Key Size: An Analysis of the WEP Encapsulation. IEEE; 2000.

Wi-Fi protected access: strong, standards-based, interoperable security for today’s Wi-Fi networks, Wi-Fi alliance. (2003). Available from: http://www.wi-fi.org/opensectio

n/pdf/whitepaperwi-fisecurity4-29-03.pdf.

Walker JR. 802.11 Security Series (Part Ii: The Temporal Key Integrity Protocol (TKIP)). Intel Corporation. Available from: http://cache-www.intel.com/cd/00/00/01/77/17769 80211.

IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information Technology – Telecommunications and Information Exchange Between Systems – Local and Metropolitan Area Networks – Specific Requirements – Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2004).

Han W, Zheng D, Chen K. Some remarks on the TKIP key mixing function of IEEE 802.11i. Cryptology Eprint Archive. (2006). Available from: http://eprint.iacr.org/2006/129.pdf

Blunk L, Vollbrecht J, Aboba B, Carlson J, Levkowetz H. Extensible authentication protocol (EAP). Internet Draft Draft-Ietf-Eap-Rfc2284bis- 06.txt. (2003).

Anthon J. (2002). Using IEEE 802.1x to Enhance Network Security. Foundry Networks. Available from: http://www.foundrynet.com/solutions/appnotes/pdfs/802.1xwhite paper.pdf

Arunesh M, Arbaugh AW. (2002). An initial analysis of the IEEE 802.1x standard. Maryland. Available from: http://www.cs.umd.edu/∼waa/1x.pdf.

Karygiannis T, Owens L. (2002). Wireless network security 802.11. Bluetooth and handheld devices. NIST. Available from: http://csrc.nist.gov/publications/ nistpubs/800-48/nistsp 800-48.pdf.

Chen JC, Jiang MC, Liu YW. Wireless LAN security and IEEE 802.11i. IEEE Wirel Commun. 2005; 12(1): 27–36p.

He C, Mitchell JC. (2004). Security analysis and improvements for IEEE 802.11i. Stanford, CA. Available from: http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/ndss05-1107.pdf.

Rupinde G, Jason S, Andrew C. Experiences in passively detecting session hijacking attacks in IEEE 802.11 Networks. Proceedings of the 2006 Australasian Workshops on Grid Computing and E-Research. 2006; 54: 221–230p.

Han L. (2006). A threat analysis of the extensible authentication protocol. Honours Project, School of Computer Science, Carleton University. Available from: http://www.scs.carleton.ca/barbeau/honours/leihan.pdf.

Phifer L. (2004). 802.11i: Robust and ready to go. Available from: Http://searchmobilecomputing.techtarget.com/tip/1.289483.sid40gci992741.00.

Perez E. (2004). 802.11i (How we got here and where are we headed). Orlando. Available from: http://www.giac.org/practical/gsec/elioperezgsec.

National Institute of Standards and Technology. Fips Pub197: Advanced Encryption Standard (AES). NIST; 2001.

Whiting D, Housley R, Ferguson N. (2003). Counter with CBC-MAC (CCM). Rfc 3610.

Kumar I. Cryptology. Laguna Hills, CA: Aegean Park Press; 1997.

Dworkin M. Recommendation for Block Cipher Modes of Operation – Methods and Techniques. NIST; 2001.

Fips Publication 197, Advanced Encryption Standard (AES). U.S. Doc/Nist, November 26, 2001.

National Institute of Standards and Technology. Request for Candidate Algorithm Nominations for the Advanced Encryption Standard. Federal Register, September 12, 1997.

Daemen J, Rijmen V. AES proposal: Rijndael, Version 2. Submission to NIST, March 1999. Available from: http://csrc.nist.gov/ encryption/aes.

IEEE Standard for local and metropolitan area networks. Wireless LAN Medium Access Control (MAC) and Physical Layer Specifications”, ANSI/IEEE Std 802.11, 1999 Edition (R2003).

Shin M, Ma J, Mishra A, Arbaugh WA. Wireless network security and interworking. Proc IEEE. 2006; 94(2): 455–466p.

Shunman W, Ran T, Yue W, Ji Z. Wireless LAN and it's security problem. Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2003. PDCAT'2003.

Matthew S. Gast, 802.11 Wireless Networks, O’REILLY, 2002.

Stallings W. Cryptography and Network Security, Principles and Practices, 3rd edition. Prentice Hall; 2003.

Sorman M, Kovac T, Maurovic D. Implementing improved WLAN security. 46th International Symposium Electronics in Marine, ELMAR-2004, Zadar. Croatia. 16--18 June 2004.

Park JS, Dicoi D. WLAN Security: Current and Future. IEEE Computer Society; 2003.

Mead NR, McGraw G. Wireless Security’s Future. IEEE Computer Society, IEEE Security and Privacy; 2003.

Williams J. Providing for wireless LAN security, Part 2. IEEE IT Pro, November December 2002. Int J Comp Sci Netw Secur. 2006; 6(5B).

Chen J-C, Jiang M-C, Liu Y-W. Wireless LAN Security and IEEE802.11i. IEEE Wireless Communications; 2005.




DOI: https://doi.org/10.37628/jrfd.v4i2.891

Refbacks

  • There are currently no refbacks.