Вы находитесь на странице: 1из 11


Its Security and control

Submitted To: Mr. Inderpal Singh GNA-IMT

Submitted By: Guru Pratap Singh 10-114

The Assignment includes an introduction part and general types of wireless networks and their applications to wireless standards, to later on continue with the wireless security. This assignment also covers the graphic representation of wireless subscriber base in INDIA. My idea was to cover also the impact of this new technology in the modern world and changes made. The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. Undoubtedly, Wireless networks are changing the way people connect to each other and that very fast. This kind of networks has become popular since the first days of introduction and use. The growing popularity of mobile hand-held devices has ignited the growth of wireless networks over the past few years. As the popularity of wireless networks increases, they are fast becoming a subject to a variety of intrusions. A number of security solutions have been proposed to protect the wireless resources, but none of these solutions have found a global acceptance. This assignment tries to evaluate these solutions and explore the various directions in wireless security.

Table of Content
I. Abstract

1. Introduction to Wireless Revolution ..3-7

1.1 Chart of Subscribers base. 3 1.2 Table showing Wireless subscribers 4 1.3 What is Wireless4 1.4 Types of Wireless network4 1.4.1 1.4.2 1.4.3 Wireless Wide Area Network5 Wireless Local Area Network6 Wireless Personal Area Network...7

2. Wireless Security and Control8-10

II Bibliography

Wireless Revolution:Wireless Revolution means in simple terms the replacement of wires used for communication, by wireless environment. For instance Local area network (LAN) has been replaced by WLAN (Wireless LAN), similarly fixed line telephones have been replaced by Mobile handsets including satellite handsets

Growth Trend of Subscribers (Wireless)

450 400 350 300 250 200 150 100 50 0 QE-Mar'08 QE-Jun'08 QE-Sep'08 QE-Dec'08 QE-Mar'09 Linear (No. of Subscribers) No. of Subscribers

Source: - India-telecom-report-wireless-subscribers

Growth Trend of Subscriber base (Wireless)

450 400 350 300 250 200 150 100 50 0 -50 2004 2005 2006 2007 2008 2009 Subscribers Linear (Subscribers)

Source: - India-telecom-report-wireless-subscribers

Particulars Total Subscribers Total Net Addition % of Monthly Growth Urban Subscribers Urban Subscribers Net Addition % of Monthly Growth Rural Subscribers Rural Subscribers Net Addition % of Monthly Growth Teledensity Urban Teledensity Rural Teledensity Share of Urban Subscriber Share of Rural Subscriber


Total Wireless + Wire line 826.93 34.55 861.48 15.34 -0.18 15.17 1.89% -0.51% 1.79% 547.42 25.94 573.36 9.38 -0.09 9.28 1.74% -0.36% 1.65% 279.51 8.61 288.12 5.97 -0.08 5.88 2.18% -0.94% 2.09% 69.19 2.89 72.08 152.41 7.22 159.63 33.44 1.03 34.47 66.20% 75.08% 66.56% 33.80% 24.92% 33.44% Source: - India-telecom-report-wireless-subscribers

Wire line

What is Wireless: Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or the entire communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing; these are also sometimes classified as wireless. There are basically three different types of wireless networks WAN, LAN and PAN:

Wireless Network




1. Wireless Wide Area Networks (WWAN): WWANs are created through the use of mobile phone signals typically provided and maintained by specific mobile phone (cellular) service providers. WWANs can provide a way to stay connected even when away from other forms of network access. a) Global System for Mobile Communication (GSM) a digital mobile telephone system. b) General Packet Radio Service (GPRS) - a packet-based wireless communication service that provides continuous connection to the Internet for mobile phone and computer users. c) Enhanced Data GSM Environment (EDGE) - a faster version of the Global System for Mobile (GSM) wireless service. d) Universal Mobile Telecommunications System (UMTS) - a broadband, packet based system offering a consistent set of services to mobile computer and phone users no matter where they are located in the world. e) Wireless Application Protocol (WAP) - a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access.

2. Wireless Local Area Network (WLAN): WLAN are wireless networks that use radio waves. The backbone network usually uses cables, with one or more wireless access points connecting the wireless users to the wired network. The range of a WLAN can be anywhere from a single room to an entire campus. A wireless local area network (WLAN) links two or more devices using a distribution method, and usually providing a connection through an access point to the wider internet. Gives the user the mobility to move around within a local coverage area & still be connected to the network. Wi-Fi: Wi-Fi is increasingly used as a synonym for 802.11 WLANs. Fixed Wireless Data: This implements point to point links between computer or networks at two locations, using microwave or laser beams over line of sight paths.

3. Wireless Personal Area Network (WPAN): WPANs are short-range networks that use Bluetooth technology. They are commonly used to interconnect compatible devices near a central location, such as a desk. A WPAN has a typical range of about 30 feet. Example Bluetooth provides a WPAN for interconnecting a headset to a laptop

Wireless Security & Control:The growing popularity of mobile hand-held devices has ignited the growth of wireless networks over the past few years. As the popularity of wireless networks increases, they are fast becoming a subject to a variety of intrusions. A number of security solutions have been proposed to protect the wireless resources, but none of these solutions have found a global acceptance. Some are discussed below: Security Problem: -1 Easy Access (Piggybacking) Wireless LANs are easy to find. Which means that your 802.11 network and its parameters are available for anybody with an 802.11 card. Attackers with high-gain antennas can find networks from nearby roads or buildings and may launch attacks without having physical access to your facility. Solution:Enforce Strong Access Control Easy access does not need to be synonymous with vulnerable. Wireless networks are designed for connectivity, but can be tightened dramatically if your security policy calls for it.

Security Problem: -2 Unauthorized Use of Service Wireless Networks are easy to find and once the person get connected with that wireless he can use the services unauthorizely. Solution:Design and Audit for Strong Authentication Wireless access point device likely shipped with a default password. Default passwords for various manufacturers are widely known and can be used to gain unauthorized access to your network. To protect from these unauthorized use of service change the default password and design a strong authentication.

Wireless Security Problem and their Solution: Security Problem

The spread spectrum modulation technique used in 802.11 and 802.11b is not secure because the code is open to the public. Service Set Identifier (SSID) is very easy to break because anyone with a sniffing tool can detect it. DHCP hurts security in a WLAN because it allows anyone to get a legitimate IP address in the network and access to the shared resources.

Security Solution
Use the latest Wi-Fi technologies such as 802.11g and 802.11n that have more advanced modulation methods. Use encryption technologies such as 802.1x, EAP, TLS, RADIUS, to protect SSID and other user identities. Use 802.11i (WPA 2) with AES technologies for strong encryption. Encrypt wireless traffic using a VPN (Virtual Private Network), such as IPSEC or other VPN solutions. Use encryption for all applications over the wireless network, e.g., use SSH and TLS/HTTPS. Use a proxy with access control for outgoing requests (web proxy, and others).

Wired Equivalent Privacy (WEP) is a very weak encryption to break.

Man-in-the-middle attacks by using a wireless analyzer.

Denial of Service (DoS) attacks: using a wireless client to insert bogus packets into the wireless LAN to cause access point malfunction, or using a high power signal generator to produce RF interference to block other radio NICs from accessing the medium.

Regularly test the security of wireless network. Enable strict logging on all devices, and check wireless log files regularly to see if security policy is still adequate.

Control by Government: Indian Wireless Act, 1933

The Indian Telegraphy Act, 1985

Wireless Telegraphy Act, 2006


Meaning and Definition:

Wireless Subscribers data:

http://trak.in/tags/business/2009/07/15/india-telecom-report-wireless-subscribers/ http://www.telecomindiaonline.com/indian-wireless-subscribers-base-reaches-826-million.html

Others: http://www.labnol.org/tech/types-of-wireless-networks/13667/