SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 1 (May. - Jun. 2013), PP 04-07
www.iosrjournals.org
www.iosrjournals.org 4 | Page
Latest Developments in WirelessNetworking and Wireless
Security
Asst. Prof. Shubhada Talegaon
Department MCA, Parul Institute of Engineering & Technology, Vadodara,Gujarat,India
Abstract: This paper illustrates some key recent developments in the area of wireless networking. It also
illustrates the key concepts of security, wireless networks, and security over wireless networks. Wireless security
is demonstrated by explaining the main specifications of the common security standards. This paper also
provides information about latest development in wireless security network with standards like 802.11ac
802.11n WPA and WPA2
Keywords:WPA, WPA2, 802.11ac,802.11,
I. Introduction
Wireless local area networks (WLAN) are common nowadays and a lot of sensitive information goes
through them. Their security is thus an essential feature of the broader issue of information security. The field of
the study of WLAN security is quite transient because new techniques to break the security mechanisms are
discovered quite frequently.
Recent developments on wireless communication technology have resulted in tremendous innovations
to make wireless access networks able to replace the wired access networks with much more bandwidth.
II. Latest Development In Wireless Networking
Home and business networkers looking to buy wireless local area network (WLAN) gear face an array
of choices. Many products conform to the 802.11a, 802.11b, 802.11g, or 802.11n wireless standards
collectively known as Wi-Fi technologies. Additionally, Bluetooth and various other non Wi-Fi technologies
also exist, each also designed for specific networking applications.
1. IEEE 802.11ac
IEEE 802.11ac is a wireless computer networking standard of 802.11, currently under development (Draft 5.0),
providing high-throughput wireless lcoal area network on the 5GHz band and is backward compatible with
802.11n’s 2.4 GHz band. Standard finalization is in late 2012, with final 802.11 Working Group approvals in
early 2014. According to a study, devices with the 802.11ac specification are expected to be common by 2015
with an estimated one billion spread around the world.
Theoretically, this specification will enable multi-station WLAN throughput of at least 1 giabit per second and a
single link throughput of at least 500 megabits per second (500 Mbit/s).
802.11n brought improvements in data rates and link efficiencies
Table 1 - 802.11ac Major Features Enhancements
802.11ac Features Customer Benefits
Wider channels Higher data rates – up to 1.3Gbps per radio
Higher encoding density Higher bit density per packet
Increased number of spatial
streams
Higher data rates per AP/client link
Beamforming Greater wireless AP/client link reliability
Multi-user MIMO Greater AP/client capacity and efficient use of spectrum
The cumulative benefit of 802.11ac features will enable Wi-Fi solutions to meet today’s demand for high
capacity and high quality mobile real-time applications like video and voice
2. 802.11n standard
IEEE 802.11n-2009 is an amendment to the IEEE 802.11-2007 wireless networking standard. Its purpose is to
improve network throughput over the two previous standards—802.11a and 802.11g—with a significant
increase in the maximum net data rate from 54 Mbit/s to 600 Mbit/s (slightly higher gross bit rate including for
Latest Development in Wirelss Networking and Wireless Security
www.iosrjournals.org 5 | Page
example error-correction codes, and slightly lower maximum throughput) with the use of four spatial streams at
a channel width of 40 MHz. 802.11n standardized support for multiple-input multiple-output and frame
aggregation, and security improvements, among other features. MIMO is a technology that uses multiple
antennas to coherently resolve more information than possible using a single antenna
The main differences between 802.11b, 802.11g, 802.11a, and 802.11n are summarized below.
Apple Product Standard Speed Range Frequency
AirPort 802.11b 11 Mbps 150 Feet 2.4 GHz
AirPort Extreme 802.11g 54 Mbps 50 Feet 2.4 GHz
AirPort Extreme 802.11a 54 Mbps 50 Feet 5 GHz
AirPort Extreme 802.11n
300 Mbps
450 Mbps§
175 Feet
2.4/5 GHz
3. German Researcher test 40 GBPS wirelessbroadband
A pair of top German research institutions has shown impressive early gains in an effort to improve
wireless broadband with speeds that would allow the download of a DVD in a single second.
German researchers on the hunt for wireless alternatives to fibre claim to have achieved 40Gbps wireless
transmission speeds over a distance of 1km.
The speed is a new world record, according to researchers at the the Fraunhofer Institute for Applied
Solid State Physics (IAF) and the Karlsruhe Institute for Technology. The pair has built transmitters and
receivers that operate at a 240GHz frequency — much higher than the the IEEE 802.11n standard, which
operates on 2.4GHz with top speeds of under 1Gbps,
The new transmitter is printed on a tiny IC chip. [Image Source: KIT]
4. DARPA has created the Wireless Network Defense program
The program aims to develop new protocols that enable military wireless networks to remain
operational despite inadvertent misconfigurations or malicious compromise of individual nodes.
A key objective of the program is to develop protocols that determine the viability and trustworthiness of
neighboring nodes and automatically adapt the network to operate through problems. Similar to a neighborhood
watch program – where neighbors know each other and can identify suspicious or unusual behavior on their
street – the protocols must help identify unusual activity that may indicate a problem on the neighboring nodes .
5. Wireless network for developing regions
Google is working on building up wireless networks in sub-Saharan Africa, Southeast Asia and other
developing regions, reports Google is said to be "deep" in the process of funding and building such networks,
Using technologies such as satellites, blimps, microcells and more, Google believes their plan will work.
III. Wireless Network Security
RSA Security questioned firms in London, Paris, Milan and Frankfurt to find out what steps were being
taken to keep data secure. RSA said that many firms it questioned also seemed to be fitting and forgetting about
wi-fi access points.
Many used the default settings that activated when the hardware was first plugged in and switched on.
AirTight Networks,The global leader in secure Wi-Fi solutions perform Financial Districts WiFi Security
Survey. Survey Report
 Visited 7 financial districts (6 in US, 1 in UK)
 Scanned WiFi signal for 5 minutes at randomly selected location
Latest Development in Wirelss Networking and Wireless Security
www.iosrjournals.org 6 | Page
 3632 APs scanned
 547 Clients scanned
 Picked up WiFi signals at 30 randomly selected points in:New York, Chicago, Boston, Wilmington,DE,
Philadelphia, San Francisco, London
 A sample WiFi trace tells a lot about network security posture in each location.
Key Findings: Widespread Use of Insecure Practices
Overall Distribution of Wi-Fi security:
 57% of Wi-Fi networks are either OPEN or using weak (WEP) encryption
Following measures are taken to make wireless network secured
1. Set up a security key for a wireless network
Personal information and files on your wireless network can sometimes be seen by people who pick up your
network signal. This can lead to identity theft and other malicious acts. A network security key or passphrase
can help to protect wireless network from this type of unauthorized access.
2. WPA
Wi-Fi Protected Access (WPA or WPA2) is more secure. There are two types of WPA authentication: WPA and
WPA2. WPA2 is the most secure. short for Wi-FiProtected Access 2, the follow on security method to WPA for
wireless networks that provides stronger data protection and network access control. It provides high level of
assurance that only authorized users can access their wireless networks.
There are two versions of WPA2: WPA2-Personal, and WPA2-Enterprise. WPA2-Personal protects
unauthorized network access by utilizing a set-up password. WPA2-Enterprise verifies network users through a
server.
3. "Hole196" vulnerability
"Hole196" is vulnerability in the WPA2 security protocol exposing WPA2-secured Wi-Fi networks to
insider attacks. AirTight Networks uncovered a weakness in the WPA2 protocol,
Central to this vulnerability is the group temporal key (GTK) that is shared among all authorized clients in a
WPA2 network. In the standard behavior, only an AP is supposed to transmit group-addressed data traffic
encrypted using the GTK and clients are supposed to decrypt that traffic using the GTK. However, nothing in
the standard stops a malicious authorized client from injecting spoofed GTK-encrypted packets! Exploiting the
vulnerability, an insider (authorized user) can sniff and decrypt data from other authorized users as well as scan
their Wi-Fi devices for vulnerabilities, install malware and possibly compromise those devices
4. Change the router defaults
Make sure to change router’s factory presets (i.e. admin login and password) to something more secure to
prevent any unauthorized users from accessing and changing router settings. Client may also change the Service
Set Identifier (SSID) name.
Turn off SSID broadcasting
The SSID functions as a broadcast message that notifiesclient presence to any and every device within range of
client network. All wireless routers have an option to turn off this broadcast, which hides client network from
people who may want to access it. It won’t encrypt client data, but no one will try to access a network they don’t
know client have
5. Allow access based on MAC addresses
Every network-enabled device – from desktops to tablets – is equipped with a unique, identifying
number called a Machine Access Code (MAC). Most common wireless routers will have an option to filter
Latest Development in Wirelss Networking and Wireless Security
www.iosrjournals.org 7 | Page
access solely based on the MAC address, allowing wireless access only to devices client have preapproved and
prohibiting all others
6. Limit DHCP
Dynamic Host Configuration Protocol (DHCP) allows limiting the number of IP addresses router can assign
on client’s wireless network, thus limiting the amount of devices that can connect. This can be done by
accessing client’s router’s administrative setting and updating the number of devices client want to connect
(both wired and wireless).
7. Disable remote administration privileges
Disabling remote administration privileges is a great way to close the door on anyone looking to access
security settings. The option should be located in router’s administrative settings and requires all security
modifications to be changed directly through a wired connection to router.
IV. Conclusion
Almost on daily basis there are new developmentsreported in protocol, appliances and techniques of
wireless networking. The use of WirelessNetwork has profoundly increaseddue to its fast connection
capabilities covering larger areas. This also results in increased accessto unauthorized users and different types
of attacks which lead to compromise in the security. WLAN vulnerabilities are mainly caused by WEP as its
security protocol. However, these problems can be solved with the new standards, such as 802.11i.
References:
[1]. http://www.oreillynet.com/pub/a/wireless/2003/12/18/wap.html
[2]. http://www.oreillynet.com/lpt/a/3333
[3]. www.sciencedaily.com/releases/2011/02/110214155503.htm
[4]. www.everymac.com/.../what-is-802.11n-differences-between-802.11n-8..
[5]. Daily Tech - May 21, 2013
[6]. Forbes
[7]. http://www.digitaltrends.com/computing/how-to-secure-a-wireless-network/#ixzz2UXkC7okz
[8]. http://www.govtech.com/gt/406582
[9]. www.digitaltrends.com

Más contenido relacionado

La actualidad más candente

Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Research review of iot
Research review of iotResearch review of iot
Research review of iotAbdullah Aziz
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET Journal
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Bluetooth vs zigbee
Bluetooth vs zigbeeBluetooth vs zigbee
Bluetooth vs zigbeeaimenriyadh
 
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
A  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EEA  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EE
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EEIJCI JOURNAL
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportROHIT SAGAR
 
Wifi direct technology a technical report
Wifi direct technology   a technical reportWifi direct technology   a technical report
Wifi direct technology a technical reportAngelos Alevizopoulos
 
Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Paul Stevens
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
 

La actualidad más candente (20)

woot15-paper-novella
woot15-paper-novellawoot15-paper-novella
woot15-paper-novella
 
Blug Talk
Blug TalkBlug Talk
Blug Talk
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
 
ioT-SecurityECC-v1
ioT-SecurityECC-v1ioT-SecurityECC-v1
ioT-SecurityECC-v1
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Research review of iot
Research review of iotResearch review of iot
Research review of iot
 
Characteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocolsCharacteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocols
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
IRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate EnvironmentIRJET - Implementation of Firewall in a Cooperate Environment
IRJET - Implementation of Firewall in a Cooperate Environment
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Bluetooth vs zigbee
Bluetooth vs zigbeeBluetooth vs zigbee
Bluetooth vs zigbee
 
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
A  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EEA  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EE
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Wifi direct technology a technical report
Wifi direct technology   a technical reportWifi direct technology   a technical report
Wifi direct technology a technical report
 
Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...Virtual security gateways at network edge are key to protecting ultra broadba...
Virtual security gateways at network edge are key to protecting ultra broadba...
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 

Destacado

Survivability Issues in Optical Wavalength Division Multiplexing (WDM) Network
Survivability Issues in Optical Wavalength Division Multiplexing (WDM) NetworkSurvivability Issues in Optical Wavalength Division Multiplexing (WDM) Network
Survivability Issues in Optical Wavalength Division Multiplexing (WDM) NetworkIOSR Journals
 
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...IOSR Journals
 
Design of a micro device to electrically separate and count wbc from whole blood
Design of a micro device to electrically separate and count wbc from whole bloodDesign of a micro device to electrically separate and count wbc from whole blood
Design of a micro device to electrically separate and count wbc from whole bloodIOSR Journals
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelIOSR Journals
 
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...IOSR Journals
 
Survey of Real Time Scheduling Algorithms
Survey of Real Time Scheduling AlgorithmsSurvey of Real Time Scheduling Algorithms
Survey of Real Time Scheduling AlgorithmsIOSR Journals
 
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...IOSR Journals
 
Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...IOSR Journals
 
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...IOSR Journals
 
Influence of Different Soil Management Practices On Soil Properties and Its I...
Influence of Different Soil Management Practices On Soil Properties and Its I...Influence of Different Soil Management Practices On Soil Properties and Its I...
Influence of Different Soil Management Practices On Soil Properties and Its I...IOSR Journals
 
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...IOSR Journals
 
Customers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in HyderabadCustomers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in HyderabadIOSR Journals
 
A Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrievalA Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrievalIOSR Journals
 
A Greybox Hospital Information System in the Medical Center Tobruk Libya base...
A Greybox Hospital Information System in the Medical Center Tobruk Libya base...A Greybox Hospital Information System in the Medical Center Tobruk Libya base...
A Greybox Hospital Information System in the Medical Center Tobruk Libya base...IOSR Journals
 
Development of Aquaponic System using Solar Powered Control Pump
Development of Aquaponic System using Solar Powered Control  PumpDevelopment of Aquaponic System using Solar Powered Control  Pump
Development of Aquaponic System using Solar Powered Control PumpIOSR Journals
 

Destacado (20)

Survivability Issues in Optical Wavalength Division Multiplexing (WDM) Network
Survivability Issues in Optical Wavalength Division Multiplexing (WDM) NetworkSurvivability Issues in Optical Wavalength Division Multiplexing (WDM) Network
Survivability Issues in Optical Wavalength Division Multiplexing (WDM) Network
 
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
Inflammatory Conditions Mimicking Tumours In Calabar: A 30 Year Study (1978-2...
 
E0432733
E0432733E0432733
E0432733
 
Design of a micro device to electrically separate and count wbc from whole blood
Design of a micro device to electrically separate and count wbc from whole bloodDesign of a micro device to electrically separate and count wbc from whole blood
Design of a micro device to electrically separate and count wbc from whole blood
 
E0552228
E0552228E0552228
E0552228
 
B0540714
B0540714B0540714
B0540714
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility Model
 
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...
 
Survey of Real Time Scheduling Algorithms
Survey of Real Time Scheduling AlgorithmsSurvey of Real Time Scheduling Algorithms
Survey of Real Time Scheduling Algorithms
 
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
A Combined Approach of Software Metrics and Software Fault Analysis to Estima...
 
Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...
 
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...
 
Influence of Different Soil Management Practices On Soil Properties and Its I...
Influence of Different Soil Management Practices On Soil Properties and Its I...Influence of Different Soil Management Practices On Soil Properties and Its I...
Influence of Different Soil Management Practices On Soil Properties and Its I...
 
K0356778
K0356778K0356778
K0356778
 
A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...A Hierarchical Feature Set optimization for effective code change based Defec...
A Hierarchical Feature Set optimization for effective code change based Defec...
 
Customers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in HyderabadCustomers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in Hyderabad
 
A Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrievalA Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrieval
 
A Greybox Hospital Information System in the Medical Center Tobruk Libya base...
A Greybox Hospital Information System in the Medical Center Tobruk Libya base...A Greybox Hospital Information System in the Medical Center Tobruk Libya base...
A Greybox Hospital Information System in the Medical Center Tobruk Libya base...
 
F0523840
F0523840F0523840
F0523840
 
Development of Aquaponic System using Solar Powered Control Pump
Development of Aquaponic System using Solar Powered Control  PumpDevelopment of Aquaponic System using Solar Powered Control  Pump
Development of Aquaponic System using Solar Powered Control Pump
 

Similar a Latest Developments in WirelessNetworking and Wireless Security

Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...CSCJournals
 
A Review on Wireless Technologies
A Review on Wireless TechnologiesA Review on Wireless Technologies
A Review on Wireless TechnologiesIRJET Journal
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
A Study Of Wireless Network Security
A Study Of Wireless Network SecurityA Study Of Wireless Network Security
A Study Of Wireless Network SecurityClaire Webber
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...IJERA Editor
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
You have persuaded XelPharms CIO that wireless networking would be.pdf
You have persuaded XelPharms CIO that wireless networking would be.pdfYou have persuaded XelPharms CIO that wireless networking would be.pdf
You have persuaded XelPharms CIO that wireless networking would be.pdfarpittradersjdr
 
4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)JIEMS Akkalkuwa
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 
Impact of Frequency Offset on Interference between Zigbee and Wifi for Smart ...
Impact of Frequency Offset on Interference between Zigbee and Wifi for Smart ...Impact of Frequency Offset on Interference between Zigbee and Wifi for Smart ...
Impact of Frequency Offset on Interference between Zigbee and Wifi for Smart ...IOSR Journals
 
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7ijtsrd
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
 
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative StudyIRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative StudyIRJET Journal
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYAJAL A J
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technologysai kumar R
 

Similar a Latest Developments in WirelessNetworking and Wireless Security (20)

Wireless
WirelessWireless
Wireless
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
 
A Review on Wireless Technologies
A Review on Wireless TechnologiesA Review on Wireless Technologies
A Review on Wireless Technologies
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
A Study Of Wireless Network Security
A Study Of Wireless Network SecurityA Study Of Wireless Network Security
A Study Of Wireless Network Security
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
You have persuaded XelPharms CIO that wireless networking would be.pdf
You have persuaded XelPharms CIO that wireless networking would be.pdfYou have persuaded XelPharms CIO that wireless networking would be.pdf
You have persuaded XelPharms CIO that wireless networking would be.pdf
 
4.report (gi fi technology)
4.report (gi fi technology)4.report (gi fi technology)
4.report (gi fi technology)
 
Y36146148
Y36146148Y36146148
Y36146148
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
Impact of Frequency Offset on Interference between Zigbee and Wifi for Smart ...
Impact of Frequency Offset on Interference between Zigbee and Wifi for Smart ...Impact of Frequency Offset on Interference between Zigbee and Wifi for Smart ...
Impact of Frequency Offset on Interference between Zigbee and Wifi for Smart ...
 
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
Wireless Standards Wi Fi 6 Evolution and Wi Fi 7
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative StudyIRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
IRJET- Wi-Fi, WiMAX & WiGig: A Comparative Study
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 

Más de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 

Último (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Latest Developments in WirelessNetworking and Wireless Security

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 1 (May. - Jun. 2013), PP 04-07 www.iosrjournals.org www.iosrjournals.org 4 | Page Latest Developments in WirelessNetworking and Wireless Security Asst. Prof. Shubhada Talegaon Department MCA, Parul Institute of Engineering & Technology, Vadodara,Gujarat,India Abstract: This paper illustrates some key recent developments in the area of wireless networking. It also illustrates the key concepts of security, wireless networks, and security over wireless networks. Wireless security is demonstrated by explaining the main specifications of the common security standards. This paper also provides information about latest development in wireless security network with standards like 802.11ac 802.11n WPA and WPA2 Keywords:WPA, WPA2, 802.11ac,802.11, I. Introduction Wireless local area networks (WLAN) are common nowadays and a lot of sensitive information goes through them. Their security is thus an essential feature of the broader issue of information security. The field of the study of WLAN security is quite transient because new techniques to break the security mechanisms are discovered quite frequently. Recent developments on wireless communication technology have resulted in tremendous innovations to make wireless access networks able to replace the wired access networks with much more bandwidth. II. Latest Development In Wireless Networking Home and business networkers looking to buy wireless local area network (WLAN) gear face an array of choices. Many products conform to the 802.11a, 802.11b, 802.11g, or 802.11n wireless standards collectively known as Wi-Fi technologies. Additionally, Bluetooth and various other non Wi-Fi technologies also exist, each also designed for specific networking applications. 1. IEEE 802.11ac IEEE 802.11ac is a wireless computer networking standard of 802.11, currently under development (Draft 5.0), providing high-throughput wireless lcoal area network on the 5GHz band and is backward compatible with 802.11n’s 2.4 GHz band. Standard finalization is in late 2012, with final 802.11 Working Group approvals in early 2014. According to a study, devices with the 802.11ac specification are expected to be common by 2015 with an estimated one billion spread around the world. Theoretically, this specification will enable multi-station WLAN throughput of at least 1 giabit per second and a single link throughput of at least 500 megabits per second (500 Mbit/s). 802.11n brought improvements in data rates and link efficiencies Table 1 - 802.11ac Major Features Enhancements 802.11ac Features Customer Benefits Wider channels Higher data rates – up to 1.3Gbps per radio Higher encoding density Higher bit density per packet Increased number of spatial streams Higher data rates per AP/client link Beamforming Greater wireless AP/client link reliability Multi-user MIMO Greater AP/client capacity and efficient use of spectrum The cumulative benefit of 802.11ac features will enable Wi-Fi solutions to meet today’s demand for high capacity and high quality mobile real-time applications like video and voice 2. 802.11n standard IEEE 802.11n-2009 is an amendment to the IEEE 802.11-2007 wireless networking standard. Its purpose is to improve network throughput over the two previous standards—802.11a and 802.11g—with a significant increase in the maximum net data rate from 54 Mbit/s to 600 Mbit/s (slightly higher gross bit rate including for
  • 2. Latest Development in Wirelss Networking and Wireless Security www.iosrjournals.org 5 | Page example error-correction codes, and slightly lower maximum throughput) with the use of four spatial streams at a channel width of 40 MHz. 802.11n standardized support for multiple-input multiple-output and frame aggregation, and security improvements, among other features. MIMO is a technology that uses multiple antennas to coherently resolve more information than possible using a single antenna The main differences between 802.11b, 802.11g, 802.11a, and 802.11n are summarized below. Apple Product Standard Speed Range Frequency AirPort 802.11b 11 Mbps 150 Feet 2.4 GHz AirPort Extreme 802.11g 54 Mbps 50 Feet 2.4 GHz AirPort Extreme 802.11a 54 Mbps 50 Feet 5 GHz AirPort Extreme 802.11n 300 Mbps 450 Mbps§ 175 Feet 2.4/5 GHz 3. German Researcher test 40 GBPS wirelessbroadband A pair of top German research institutions has shown impressive early gains in an effort to improve wireless broadband with speeds that would allow the download of a DVD in a single second. German researchers on the hunt for wireless alternatives to fibre claim to have achieved 40Gbps wireless transmission speeds over a distance of 1km. The speed is a new world record, according to researchers at the the Fraunhofer Institute for Applied Solid State Physics (IAF) and the Karlsruhe Institute for Technology. The pair has built transmitters and receivers that operate at a 240GHz frequency — much higher than the the IEEE 802.11n standard, which operates on 2.4GHz with top speeds of under 1Gbps, The new transmitter is printed on a tiny IC chip. [Image Source: KIT] 4. DARPA has created the Wireless Network Defense program The program aims to develop new protocols that enable military wireless networks to remain operational despite inadvertent misconfigurations or malicious compromise of individual nodes. A key objective of the program is to develop protocols that determine the viability and trustworthiness of neighboring nodes and automatically adapt the network to operate through problems. Similar to a neighborhood watch program – where neighbors know each other and can identify suspicious or unusual behavior on their street – the protocols must help identify unusual activity that may indicate a problem on the neighboring nodes . 5. Wireless network for developing regions Google is working on building up wireless networks in sub-Saharan Africa, Southeast Asia and other developing regions, reports Google is said to be "deep" in the process of funding and building such networks, Using technologies such as satellites, blimps, microcells and more, Google believes their plan will work. III. Wireless Network Security RSA Security questioned firms in London, Paris, Milan and Frankfurt to find out what steps were being taken to keep data secure. RSA said that many firms it questioned also seemed to be fitting and forgetting about wi-fi access points. Many used the default settings that activated when the hardware was first plugged in and switched on. AirTight Networks,The global leader in secure Wi-Fi solutions perform Financial Districts WiFi Security Survey. Survey Report  Visited 7 financial districts (6 in US, 1 in UK)  Scanned WiFi signal for 5 minutes at randomly selected location
  • 3. Latest Development in Wirelss Networking and Wireless Security www.iosrjournals.org 6 | Page  3632 APs scanned  547 Clients scanned  Picked up WiFi signals at 30 randomly selected points in:New York, Chicago, Boston, Wilmington,DE, Philadelphia, San Francisco, London  A sample WiFi trace tells a lot about network security posture in each location. Key Findings: Widespread Use of Insecure Practices Overall Distribution of Wi-Fi security:  57% of Wi-Fi networks are either OPEN or using weak (WEP) encryption Following measures are taken to make wireless network secured 1. Set up a security key for a wireless network Personal information and files on your wireless network can sometimes be seen by people who pick up your network signal. This can lead to identity theft and other malicious acts. A network security key or passphrase can help to protect wireless network from this type of unauthorized access. 2. WPA Wi-Fi Protected Access (WPA or WPA2) is more secure. There are two types of WPA authentication: WPA and WPA2. WPA2 is the most secure. short for Wi-FiProtected Access 2, the follow on security method to WPA for wireless networks that provides stronger data protection and network access control. It provides high level of assurance that only authorized users can access their wireless networks. There are two versions of WPA2: WPA2-Personal, and WPA2-Enterprise. WPA2-Personal protects unauthorized network access by utilizing a set-up password. WPA2-Enterprise verifies network users through a server. 3. "Hole196" vulnerability "Hole196" is vulnerability in the WPA2 security protocol exposing WPA2-secured Wi-Fi networks to insider attacks. AirTight Networks uncovered a weakness in the WPA2 protocol, Central to this vulnerability is the group temporal key (GTK) that is shared among all authorized clients in a WPA2 network. In the standard behavior, only an AP is supposed to transmit group-addressed data traffic encrypted using the GTK and clients are supposed to decrypt that traffic using the GTK. However, nothing in the standard stops a malicious authorized client from injecting spoofed GTK-encrypted packets! Exploiting the vulnerability, an insider (authorized user) can sniff and decrypt data from other authorized users as well as scan their Wi-Fi devices for vulnerabilities, install malware and possibly compromise those devices 4. Change the router defaults Make sure to change router’s factory presets (i.e. admin login and password) to something more secure to prevent any unauthorized users from accessing and changing router settings. Client may also change the Service Set Identifier (SSID) name. Turn off SSID broadcasting The SSID functions as a broadcast message that notifiesclient presence to any and every device within range of client network. All wireless routers have an option to turn off this broadcast, which hides client network from people who may want to access it. It won’t encrypt client data, but no one will try to access a network they don’t know client have 5. Allow access based on MAC addresses Every network-enabled device – from desktops to tablets – is equipped with a unique, identifying number called a Machine Access Code (MAC). Most common wireless routers will have an option to filter
  • 4. Latest Development in Wirelss Networking and Wireless Security www.iosrjournals.org 7 | Page access solely based on the MAC address, allowing wireless access only to devices client have preapproved and prohibiting all others 6. Limit DHCP Dynamic Host Configuration Protocol (DHCP) allows limiting the number of IP addresses router can assign on client’s wireless network, thus limiting the amount of devices that can connect. This can be done by accessing client’s router’s administrative setting and updating the number of devices client want to connect (both wired and wireless). 7. Disable remote administration privileges Disabling remote administration privileges is a great way to close the door on anyone looking to access security settings. The option should be located in router’s administrative settings and requires all security modifications to be changed directly through a wired connection to router. IV. Conclusion Almost on daily basis there are new developmentsreported in protocol, appliances and techniques of wireless networking. The use of WirelessNetwork has profoundly increaseddue to its fast connection capabilities covering larger areas. This also results in increased accessto unauthorized users and different types of attacks which lead to compromise in the security. WLAN vulnerabilities are mainly caused by WEP as its security protocol. However, these problems can be solved with the new standards, such as 802.11i. References: [1]. http://www.oreillynet.com/pub/a/wireless/2003/12/18/wap.html [2]. http://www.oreillynet.com/lpt/a/3333 [3]. www.sciencedaily.com/releases/2011/02/110214155503.htm [4]. www.everymac.com/.../what-is-802.11n-differences-between-802.11n-8.. [5]. Daily Tech - May 21, 2013 [6]. Forbes [7]. http://www.digitaltrends.com/computing/how-to-secure-a-wireless-network/#ixzz2UXkC7okz [8]. http://www.govtech.com/gt/406582 [9]. www.digitaltrends.com