Wireless LAN Security: Securing Your Access Point

Wireless LAN Security: Securing Your Access Point

Abstract
Wireless Local Area Network (WLAN) is vulnerable to attacks due to the use of radio frequency, which encounters data revelation. This paper describes about wireless security in the physical layer, dealing namely with Access Points (AP). It is recommended to secure wireless LANs with a layered approach. Where best to begin securing the network than starting with the physical layer?
1. Introduction
Wireless networks are totally different to wired networks, which can be physically secured. The information goes through the air, where anyone can transmit and anyone can receive. Signals are not guided by wires. WLANs are therefore essentially vulnerable to interception.
The 802.11 standard covers wireless networks. This classification actually comes from Institute of Electrical and Electronics Engineers (IEEE) where they create standards, and they number these standards in unique ways.
The 802.11 standard had two primary goals when it was initially written:-
1) ease of accessibility
2) connection
In other words, the 802.11 was developed as an ‘open’ standard. Bear in mind, when security is not engineered into a solution during the initial stages, the security solutions have historically been less than optimal.
There are currently a lot of worries about wireless security. Standard networks at home or at work are based on physical connectivity. With wireless there is no physical connection. Wireless access points are really radio transmitters. They use radio waves that can go through walls and buildings. This makes connecting to a local network in your home or place of employment very versatile. The downside is that connecting to your network as
an intruder is a lot easier. Security considerations now have to be taken to prevent unauthorized access to your network and data.
Section 2 will describe the theoretical background of WLAN. To start securing wireless network, there are four elements that need to be addressed. Section 3 and 4 will...

Similar Essays