Security and Privacy in Wireless LAN

Security and Privacy in Wireless LAN - Security and Privacy...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Security and Privacy in Wireless LAN By R.PHANEENDRA ( phanirampally@gmail.com ) K.R NISHITH REDDY ( kotanishith@yahoo.com ) VAAGDEVI COLLEGE OF ENGINEERING
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
ABSTRACT Wireless local area networks (wireless LANs, or WLANs) are metamorphosing the landscape of computer networking. The use of mobile computing devices, such as laptops and personal digital assistants, coupled with the demand for continual network connections without having to "plug in," are driving the adoption of enterprise WLANs. Network managers are using WLANs to facilitate network moves, add-ons and changes. In addition, the inherent flexibility of WLANs overcomes limitations created by older buildings, leased spaces, or temporary work areas. This topic is not only the most fundamental Internet Privacy and Security topic , but also arguably the most technical and complex one. When we think about computer security, networking security will surely be at the top of our list of considerations, as so many threats to our privacy and security are network borne. . So Ours is a little effort in laying out an advice for the future technocrats in making sure of their ideas and to give them the information which they can use it in a right way. This paper not only furnishes the details about Wireless LANs but also bestows an abundant number of methods in which the security of these WLANs can be breached. It also contributes a myriad number of ways in which one can thwart the potential assault on the WLANs network. KEYWORDS: Wireless LAN Security Hacking Access points.
Background image of page 2
INTRODUCTION TO WIRELESS LAN: High-speed wireless LANs can provide the benefits of network connectivity without the restrictions of being tied to a location or tethered by wires. Wireless connections can extend or replace a wired infrastructure in situations where it is costly or prohibitive to lay cables. Portable access to wireless networks can be achieved using laptop computers and wireless NICs. This enables the user to travel to various locations and still have access to their networked data. Without wireless access, the user would have to carry clumsy cabling and find a network tap to plug into. For businesses, wireless networks give more mobility and flexibility by allowing employees to stay connected to the Internet and to the network as they roam. Beyond the corporate campus, access to the Internet and even corporate sites could be made available through public wireless “hot spots.” networks. Airports, restaurants, rail stations, and common areas throughout cities can be provisioned to provide this service.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The IEEE has produced the series of standards referred to as 802.X, which encompassed LANs, MANs and PANs. The IEEE 802 is confined to standardizing processes and procedures that take place in the bottom two layers of the OSI Reference Model - The Media Access Control (MAC) or link layer and the Physical layer. The committee of IEEE 802 standards is currently divided up into working groups numbered 802.1 through 802.17. The figure shows how the 802.1x wireless security process is supposed to work.
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 12

Security and Privacy in Wireless LAN - Security and Privacy...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online