Write Articles A community of people who love to write

The easiest domain name (Note the .ORG) - Absolutely Free!

Home | Submit Articles | Login   

Wireless security : Features, Threats and Flaws of wireless networks

BY: books_freek | Category: Technology and Computers | Post Date: 2009-06-21

•    Read Comments

•    Print This Article

Help others find this article:

Show All Social Bookmarks


Data link layer is the second layer in the OSI model [Open System Interconnection, an ISO standard for worldwide communications defining a networking framework for implementing protocols in seven layers] which is responsible for error detection and correction. Wireless securities for infrared links rely on the limited spread of infra red signal, which cannot penetrate walls and requires direct line of sight to communicate. Thus on security feature is implemented, hacking infra red networks is impossible.

Wireless LAN [local area network] is different from Ethernet because it is half duplex. Ethernet or LAN [local area network] access point is a translational bridge. Since detecting collisions is no possible in wireless network CSMA [Carrier Sense Multiple Access] or CA [Collision Avoidance] algorithm is used.

In wired connection is established by plugging the cable while in wireless authentication request or response is required to get connected and to discover each other.

The IEEE [Institute of Electrical and Electronics Engineers]- IEEE is an organization of engineers, scientists, and students. The IEEE is known for developing standards for the computer and electronics industry. The standard recognized for LAN [local area network]-802.11

Bluetooth can function as circuit switching [voice communication] or packet switching [Transmission Control Protocol/internet protocol]. LMP-LINK MANAGER PROTOCOL is responsible for connecting the two devices. It decides and controls the size also provides security features like authentication using links and keys. SDP-SERVICE DISCOVERY PROTOCOL helps to gather information of enabled devices like device type, services and specification to connect. There are different application layer protocols for different functions of Bluetooth.

The following are wireless network security threats:

In both the management frames are neither encrypted nor authenticated. Anyone can transmit; analyze them without being associated with the target network. Every Bluetooth has a unique id transmitted, thus when anyone eavesdrops the device is tracked. Also by sending de-authenticated and disassociating frames the tracker can knock the host offline. They can insert their machine by getting the Mac and ipadd and provide different channel to associate, all these are done through a special tool.

Hence they use WEP encryption-wired equivalent privacy to authenticate wireless host if the shared key authentication method is enabled. Shared key authentication occurs when access point sends a nonce to the authenticating client. The client responds and sends to the wireless access point where it decrypts compares it with initial value to make decision.

Article Source: http://www.saching.com

About Author / Additional Info: Data link layer-wireless security- features, flaws and threats of wireless networks were summarized above in detail.

Additional Articles:
* Caged Creatures for Kids. Animals that you can keep at home in a cage.
* Orphans and Boulders
* Advantages and benefits of a Term Insurance
* Financing of health care in India
* Tips on buying a used car. Why should I buy a second hand car.

Does this article violate or infringe on your copyright ?
It is a violation of our terms for authors to submit content which they did not write and claim it as their own. If this article infringes on your copyrights, then use our Contact us form with the detailed proof of infringement along with the offending article's title, URL and writer name. If you do not hear back from us then contact us again in another 10 days. Thank you.

Comments on this article: (0 comments so far)

* Additional comments are now closed for this article *
Comment Comment By Comment Date

Article Views: 4317

Page copy protected against web site content infringement by Copyscape
Copyright 2010 saching.com - Do not copy articles from this website.

Important Disclaimer: All articles on this website are for general information only and is not a professional or experts advice. We do not own any responsibility for correctness or authenticity of the information presented in this article, or any loss or injury resulting from it. We do not endorse these articles, we are neither affiliated with the authors of these articles nor responsible for their content. Please see our disclaimer section for complete terms.

| Home | Disclaimer | Xhtml |