Wireless Network Security

Channel-PUFs: AI-Assisted Channel Estimation for Enhanced Wireless Network Security

Abstract: 

Next Generation Mobile Networks (NGMNs) are entering existing and future (industrial) wireless networks, associated with advantages such as higher data throughput, low latency, operation in almost real-time, and the microcell approach. However, this development also comes with drawbacks in the form of new attack vectors and security threats.

An Analysis of Current 802.11 Wireless Network Layer One and Two Attacks and Possible Preventative Measures

ABSTRACT

The last 2 years has seen a major increase in the number of users of wireless networks, for both public and private use. Initially, there were a number of problems with data security, such as WEP, that made wireless networks vulnerable to attack. While data security has been increased through the use of tougher encryption and other methods, newer attacks based on lower levels are emerging. Layer 1 is the physical medium used to send the signal, in this case radio frequency, with connection and management handled by the MAC sub-layer of layer 2. Tools such as Airjack and Void11 can be used to launch DDoS and man-in-the-middle attacks against layer 2 of wireless networks, with jamming attacks used against the Physical layer.

Vulnerability of Wireless Networks to Interception

ABSTRACT

This paper examines the vulnerability of wireless systems to interception, and provides some simple steps that can be taken to improve security. A commercially available computational electromagnetic software package was used to predict signal levels in complex indoor and urban environments. The simulation results can be used to determine the detection range of the network. Two basic scenarios are presented: (1) indoor-to-outdoor propagation for a local area network operating in a two story building, and (2) a wireless point-to-point link on an airbase. The simulations illustrate some of the unique propagation conditions that occur inside of buildings and in urban areas. This research has identified several possible system weaknesses and suggested some simple, yet effective, methods of improving security.

On Wireless Network Security

ABSTRACT

We discuss practical security of 802.11b wireless networks through three anecdotal case studies. The dangers facing a university faculty, a small business and a home user are explored. Information Burglary—industrial espionage against telecommuters—is introduced. We investigate the underlying causes of security holes, spanning theoretic algorithmic flaws, deployment errors and end-user naivety. Failures to appreciate the range of radio coverage are highlighted and features interactions with other technologies are explored. Technical and ethical suggestions for improvements by the industry and network administrators are made.

Australian Defence Force Policy and the use of WPA2 as a Security Option for Deployment of 802.11 Wireless Networks in the Field

ABSTRACT

The wireless function is an under utilised resource for many military organisations. Until recently, Defence wireless local area network assessments have highlighted wireless inadequacies in relation to data security and the protection of sensitive information. But since the introduction of WPA2 and the acquisition of wireless applications into U.S Dept. of Defence networking infrastructure, global defence departments are testing wireless applications for advantages in the military domain. This paper examined WPA2’s security mechanisms and their relationship with the Australian Defence Force policy and military operational environments. Though still officially unacknowledged in the Australian military landscape, WPA2 offers a robust security solution that can potentially provide the Australian Defence Force with the networking flexibility that only wireless delivers. The analysis conducted here suggests that the use of wireless networks to support military operations when secured using WPA2 methods is feasible.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com