Você está na página 1de 11

Wireless Network Security

Analysis and Enhancement


Techniques
A RESEARCH PROPOSAL

1. Introduction
Wireless networks are easy to setup and affordable. Their availability is
location independent in the particular area as compared to the
conventional wired connections. However will accessibility comes security
issues. Over wireless technology your data is flowing without any
constraints i.e. wires. Thus there are security issues that might damage
your data.
The study shows that wireless LANs are prone to many different kinds of
attacks ranging from passive to active, and that wireless security
initiative has come a long way, from weak WEP to a more robust WPA2. It
also show that optimal security solution for Wireless LANs involves a
combination of security technologies, and that vulnerability assessment
and risk analysis are essential for development of effective security policy
and determination of appropriate security measures for risk mitigation.

2. Aim
To understand the different security issues in context of wireless
network security and provide suitable mitigation techniques using
different technologies. This proposal also tells us about the future
perspective of the problems and their mitigation problems.

3. Objective
Understand different security issues on the present WEP technology
Taking a next step by using WPA2 and 802.11i technology
Studying the various security techniques already available

4. Statement Of Problem
Wireless technology should be entirely protected to mitigate the
unauthorized access of data.
However, the present technology is not so advance to entirely
protect the data and prevent loss or unauthorized access of
personal information.
In response to this problem, a security measure should be
developed so that there is not even a single bit of data loss or a bit
experiences some security issues.

5. Methodology
1.The present condition of the WEP(Wired Equivalent Privacy)
technology are not that efficient enough to protect the data to
maximum security. Analysis of the present situation of the security
threats using the presently available equipment will be the stepping
stone in the research.
2.The various security techniques should be analyzed beforehand to
find the gaps associated with the inefficient solutions already
implemented in the past and out technology in the future and the
ways they can be manipulated to breach.
3. The problems faced in the analysis phase will be corrected by
implementing the next step technology in the wireless networks. The
WPA2 and the 802.11i algorithms using various efficient algorithmic
approaches and presently available resources.

Phase
S.N Step
Description
Division
o
1.

System
1Study

Recognizing and
classifying security
issues.

Phase 1Identify

To study the
WLAN, a routine
should be
implemented

Phase 2Classify

Classify the
issues according
to the subject
and availing the
required
personnel

Requireme
nt

Specificatio Time
n

Quanti
ty

Client
Price(
$)

4
week
s
An Engineer

An
Employee

Wireless
Networks

Should know
how to
handle the
respective
subject
matter

8000

500 per 2000


routine

1000
per
routine

Week
1-2

Week
3-4

Total(
$)

6000

S.N
o22
0

Step

Description

2.

System 2Analyze

Analyzing
security
problems.

Phase 1Analyze
Microprog
ramming
Issues

Phase 2Analyze
attacks

Requiremen
t

Time

Quantity

Client
Total($
Price($) )

2
weeks

6200

An Employee

Core
microprogrammi Week 1
ng and hardware
skills

600 per
routine

3000

An engineer

Should have
sound
knowledge of
the wireless
network security
domain.

400 per
routine

3200

Microprogrammi
ng issues are
analyzed by
scrutinizing the
hardware of the
present
technology.

Analyze the
different attacks
on the present
WEP technology:
Weak IV, IV
Collision,
Message
modification,
Message
injection and
other attacks.

Specification

Week 2

S.N
o

Step

Description

3.

System
3Deploy

Implementing the
802.11i
technology.

Phase 1

Requireme
nt

Specificatio Time
n

Quanti
ty

12
weeks

Testing the
technology on
the consumer
hardware and
finding out the
results with
proper feasibility
charts

Total(
$)
70000

An Engineer

Networks

An engineer

Networks

10

20

Implementing
the technology
using the
custom made
hardware
Phase 2

Client
Price(
$)

2000
per
routin
e

10000

60000
3000
per
routin
e

Risk Analysis
Inomplete protection of data
Though the technology will be designed to completely protect the
data i.e. even a single bit loss will not be tolerated. There is a risk of
persistence noise and hence incomplete protection of data at this
minute scale of technology implementation.
Adaptation
There might be a risk of equipment not adapting to the technology
reinvented.
Support
The new wireless techniques might prove unsupported to the
present hardware technology.

Benefits
1.

Pure security of data

2.

No loss of data

3.

Accurate provision of data

4.

Reduced network latency

5.

Flexible network topology possibility

Conclusion
The present wireless network provision overlooks the fact that the
data loss in this competitive world will prove to be not less than a
disaster. However consumers rely on the less secure networks
protected with WEP or WPA technologies where there is somewhere
loss of data or there is a constant risk of security breach as the
technology is quite for some time in the computing world and hence
a number of ways are there to break the secure shield. There is a
need to find a solution to this problem and a feasible solution is
there by implementing the 802.11i standards in the network instead
of a/b/g/n. There are risks with the technology but further
implementation of knowledge can prove to make the standard a
success.

Você também pode gostar