CHAPTER ONE
INTRODUCTION
- Background of the Study
In today’s era, everyone wants their
necessary data to be handy, portable and accessible from almost every place
they visit throughout the day and this is made possible by using wireless
networks. Wireless networks, as the name suggests, are those networks that are
not connected by any physical means such as Ethernet cables and thus provide
the user with great mobility and convenience. Also, it saves one from the
expenses on the cables that would be required if wired network is chosen as
well as makes it easier for moving the base of the devices from location to
another by just moving the machine along with the wireless network card.
Wireless local area network (WLAN) has been so widely used in many sectors in
the world. It gained popularity due to many reasons, such as installation
flexibility, ease of installation, reduced cost-of-ownership, mobility, and scalability. However,
regardless of those benefits, WLAN also have some security threats. This paper
begins by introducing the concept of WLAN. The introductory section of this
project gives brief information on the WLAN components and its architecture.
- Problem Statement
Wireless LAN communications are not private channels. Thus, anyone
can access the public domain channel. They are easily susceptible to hackers
trying to access sensitive information. Whereas, mischievous person can use a
wireless client to insert bogus packets into the wireless LAN with the intent
of keeping users from getting access to services. There is also a scenario
where there will be a Passive attacks to decrypt traffic based on known
plaintext and chosen cipher text attacks. A case where the intruder floods the
network with either valid or invalid messages affecting the availability of the
network resources. Eavesdropping by the third parties is the most significant
threat because the attacker can intercept the transmission over the air from a
distance, away from the premise. Another security problem is to inject new
traffic from unauthorized mobile stations. Due to the nature of the radio
transmission, the WLAN are very vulnerable against denial of service attacks.
However, an attacks to decrypt traffic, based on tricking the access point into
redirecting wireless traffic to an attacker’s machine is another security issue
in wireless LAN.Another attack is modifying the original data before getting to
the intended user. Wireless LANs intentionally radiates network traffic into
space, This makes it impossible to control who can receive the signals in any
wireless LAN installation. Also, since it is a public channel, it is difficult
to manage the access and thus the potential is present for users to interfere
with each other.
- Aim and ObjectivesAim
The aim of this project is to analysethe security mechanisms in
wireless local area network in detail.
1.3.2 Objectives of the Study
- To discuss the variety
components of wireless local area network.
- To discuss the various
security protocols being used by wireless LAN.
- To design a simple but
effective wireless network to simulate how the packets move about the network,
and to show various security settings of the network.
- To show the vulnerability of
the existing wireless protocols.
- To make a full research on
how encryption and decryption of data works, especially on advance encryption
system.(AES)
- To suggest a better security
mechanism and management techniques for a secured
effective and efficient communication, from the wireless network.
This research endevours the use of effective and secured wireless
network, this way, many researchers and students all over the world working
endlessly in other make wireless LAN to be secure for public and private use,
like homes, schools, airports, business offices, government buildings, military
facilities, coffee shops, book stores, as well as many other venues. One of the
primary advantages offered by WLAN is its ability to provide connectivity to
portable devices, such as wireless laptops and smart phones. However, using
wireless network without the knowledge of how its security work is like walking
half-naked, therefore, this research bring about the effectiveness and benefit
of security in wireless LAN to the people so they can use the wireless LAN
safely and secured anywhere.
- Scope of Study
The scope of this research is limited to the study of security settings in wireless local area network protocols which are WEP, WPA and WPA2, due to the constraint of time, the research should have go broader to study other wireless network protocols like CHAP, PAP, VPN etc.