Abstract
Wireless communication provides users many benefits such as portability, flexibility, reduced hardware need and lower installation costs. Wireless local area networks (WLANs) for example allow users the ability to carry their laptops from place to place without any physical wires and without losing network connectivity.However, some amount of security risk is always associated with wireless networks. The most significant security risk for wireless technology is the potential outsiders have in gaining access to the communications medium, the communications medium being the air waves. Though WLANs provide the users with the option of roaming, this convenience is facilitated by broadcasting packets to anyone with compatible equipment within range of a transmitting device. This broadcasting of packets induces a compromise between convenience and security. Having an unsecured WLAN can result in a loss of service, or can be used as a staging area to launch attacks against other networks. The significant challenges faced today in securing wireless LANs are maintaining privacy, data confidentiality, and preventing unauthorized access using proper access control mechanisms.As wireless networking and security become more prevalent in the market, more and more computer science programs are incorporating courses in wireless networks or at the least, devoting a significant percentage of the advanced networking courses to wireless topics. As a result, in addition to industry practitioners, there is a growing interest among university researchers and faculty regarding tools used in monitoring and assessing security threats for wireless networks.This paper will demonstrate and evaluate a free and open source software tool, called Network Stumbler, used for monitoring and assessing security threats for wireless networks. Network Stumbler is a Windows-based tool that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:• Verifies that your network is set up the way you intended.• Find locations with poor coverage in your WLAN.• Detects other networks that may be causing interference on your network.• Detects unauthorized "rogue" access points in your workplace.• Helps aim directional antennas for long-haul WLAN links.• Can be used recreationally for WarDriving.
- Milner, Marius, Network Stumbler Tool Help Section, www.netstumbler.com.]]Google Scholar
- Hurley, Chris, Frank Thornton, Michael Puchol and Russ Rogers. Wardriving: Drive, Detect and Defend -- A Guide To Wireless Security. ISBN 1--931836-03--5, 2004.]] Google ScholarDigital Library
- Puchol, Micahel and Russ Rogers. www.simplywireless.com.au/sitesurvey.htm]]Google Scholar
- Flickenger, Rob. Wireless Hacks (Chapter 3). ISBN: 0--596--00559-8, 2003.]] Google ScholarDigital Library
- Peikari, Cyprus and Seth Fogie. Maximum Wireless Security (Chapter 9). ISBN: 0--672--32488--1. 2002]] Google ScholarDigital Library
Index Terms
- Evaluation and illustration of a free software (FS) tool for wireless network monitoring and security
Recommendations
The performance of a watchdog protocol for wireless network security
In wireless networks, a watchdog mechanism can be a part of the security architecture used to identify nodes that fail to forward the packets they agree to forward. In this paper, we propose two protocols to address the ambiguous collision limitation of ...
Network coded ALOHA for wireless multihop networks
WCNC'09: Proceedings of the 2009 IEEE conference on Wireless Communications & Networking ConferenceThe purpose of this paper is to show the possibility of combining slotted ALOHA with network coding in wireless multihop networks. In particular, we focus on a star topology in which outer nodes exchange data with each other through a center node. The ...
Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks
The IEEE 802.15.3 specification is proposed for short-range high-speed Wireless Personal Area Networks (WPANs). Furthermore, it is proposed by the IEEE 802.15.3 a task group for Ultra-Wideband (UWB) transmission, which is an emerging wireless technology ...
Comments