written 7.9 years ago by | • modified 7.9 years ago |
Mumbai University > Information Technology > Sem 7 > Wireless Technology
Marks: 10M
Year: May 2016
written 7.9 years ago by | • modified 7.9 years ago |
Mumbai University > Information Technology > Sem 7 > Wireless Technology
Marks: 10M
Year: May 2016
written 7.9 years ago by |
To be able to secure a wireless network, the 802.11 standard includes a set of security features: Service Set Identifier (SSID) which is used to control access to an Access Point (AP), the Access Control List (ACL) to prevent unauthorized access, and the Wired Equivalent Privacy (WEP) protocol intended to provide data security.
Service Set Identifier (SSID)
From a layered defense concept, the SSID is the first security level provided by the 802.11 standard to control the wireless network access. The SSID is a unique identifier up to 32 characters attribute to the network or a domain at network set up time. Every wireless client and Access Point belonging to the same network must use the same SSID. When a wireless client tries to connect to an AP, the SSID acts as a password device must provide to be authorized to join the network. Contrary to other security features, the SSID mechanism is mandatory and cannot be disabled. Each 802.11 device manufacturer provides a default identifier value. Below is a table of the major manufacturer’s SSID.
ACL
The Access Control List (ACL) is another way to control access to the wireless network, still based on the layered defense concept. The network administrator can allow or deny access to the Access Point by configuring ACL on the AP itself. ACL relies upon a MAC addresses table stored on the AP to authenticate individual clients requesting access to the Access Point. This feature increases the security of the wireless network by preventing unauthorized access to the Access Point. Contrary to the SSID, the ACL is an optional feature.
WEP
To give wireless networks an equivalent security level as the wired network, the 802.11 standard defined the Wired Equivalent Privacy (WEP) protocol. This protocol is used to protect wireless communication from eavesdropping through encryption and to prevent unauthorized access to the wireless network with authentication. Both encryption and authentication mechanisms rely on a secret key shared between a mobile station and the Access Point. Note that WEP is defined by the standard as optional and neither Access Points nor wireless devices are obliged to use it. It is also possible to have a wireless device using the authentication feature but not the encryption one and vice versa.
The ultimate requirements of wireless security can fall into two categories: