CFP last date
20 January 2025
Reseach Article

Network Security Issues in Context of RSNA and Firewall

by Mohd. Izhar, Mohd. Shahid, V.r.singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 82 - Number 16
Year of Publication: 2013
Authors: Mohd. Izhar, Mohd. Shahid, V.r.singh
10.5120/14250-2459

Mohd. Izhar, Mohd. Shahid, V.r.singh . Network Security Issues in Context of RSNA and Firewall. International Journal of Computer Applications. 82, 16 ( November 2013), 33-38. DOI=10.5120/14250-2459

@article{ 10.5120/14250-2459,
author = { Mohd. Izhar, Mohd. Shahid, V.r.singh },
title = { Network Security Issues in Context of RSNA and Firewall },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 82 },
number = { 16 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume82/number16/14250-2459/ },
doi = { 10.5120/14250-2459 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:57:56.179791+05:30
%A Mohd. Izhar
%A Mohd. Shahid
%A V.r.singh
%T Network Security Issues in Context of RSNA and Firewall
%J International Journal of Computer Applications
%@ 0975-8887
%V 82
%N 16
%P 33-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network Security is a major issue in wired and wireless network. Wireless Network is more vulnerable to attack. Vulnerability is the threat to the network in the form of virus or the way used by attacker in order to breach the security and bypass the security measures. IEEE 802. 11i and 802. 11-2007 provides RSNA methods for wireless network security. WECA, the alliance for Wi-Fi devices provides WPA2 modes of security. The responsibility of network administer is to provide network resources to the legitimate and authorized users and at the same is to protect it from illegitimate and misuse by unauthorized, immoral unlawful clients and cyber criminals and also to find the solution for the other security threats such as Phishing, malware and malicious code. The Network resources are made available by way of authentication and authorization of users. The protection against illegal and misuse of network is taken place by applying some RSNA and WPA2 Methods. But these authentications, authorizations and protections of RSNA and WPA2 modes are weak and vulnerable to numerous attacks and its advanced version such as 802. 11n with AES gets compatibility issues with software as well as with hardware. This Paper, by developing a practical network scenario and configuring its devices according to various RSNA and WPA2 modes examines these security measures and conclude that these security methods are not sufficient and requires more other measures. These others measures such as web browser compatibilities, OS effectiveness, firewall and hardware security modules have been taken into account in order to develop a secure wireless Network Model. Various Network Monitoring tools have also been used to show that how easily the security is breached and/or bypassed.

References
  1. IEEE Std 802. 11™-2007, Revision of IEEE Std 802. 11-1999, IEEE 3 Park Avenue New York, NY 10016-5997, USA 12 June 2007.
  2. IEEE Std. 2009 Revision of IEEE Std 802. 11™-2007, 30 Sept. 2009.
  3. Changhua He & John C Mitchell "Security Analysis and Improvements for IEEE 802. 11i", Network and Distributed System Security Symposium, San Diego, California, 3-4 February 2005.
  4. Shivaputrappa Vibhuti, "IEEE 802. 11 WEP (Wired Equivalent Privacy) Concepts and Vulnerability" , San Jose State University, CA, USA, CS265 Spring 2005 (26. 03. 2005)
  5. NETGEAR, Inc. "Wireless Networking Basics", October 2005.
  6. Lu Zhengqiu; Tian Si; Wang Ming; Ye Peisong; Chen Qingzhang; "Security analysis and recommendations for Wireless LAN 802. 11b network", Consumer Electronics, Communications and Networks (CECNet), 2011 International Conference on 16-18 April 2011.
  7. Finn Michael Halvorsen & Olav Haugen "Cryptanalysis of IEEE 802. 11i TKIP", Norwegian University of Science and Technology, June 2009.
  8. IEEE Std 802. 11i-2004, Amendment to IEEE Std 802. 11™, 1999 Edition (Reaff 2003) as amended by IEEE Stds 802. 11a™-1999, 802. 11b™-1999,802. 11b™-1999/Cor 1-2001, 802. 11d™-2001, 802. 11g-2003, and 802. 11h-2003] Amendment 6: Medium Access Control (MAC) Security Enhancements, 23 July 2004.
  9. Back and Tews "Practical attacks against WEP and WPA", November 8, 2008.
  10. Paul Arana, "Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2)", INFS 612 – Fall 2006
  11. Behrouz A. Forouzan "Data Communication and Networking", McGraw-Hill Forouzan Networking Series, Fourth Edition Copyright © 2007.
  12. NIST Special Publication 800-97, "Establishing Wireless Robust Security Networks: A Guide to IEEE 802. 11i", February 2007.
  13. Diaa Salama Abd Elminaam1, Hatem Mohamed Abdual Kader, and Mohiy Mohamed Hadhoud, "Evaluating The Performance of Symmetric Encryption Algorithms", International Journal of Network Security, Vol. 10, No. 3, PP. 213{219, May 2010
  14. A. K. M. Nazmus Sakib et al"Security Improvement of WPA 2 (Wi-Fi Protected Access 2)" (IJEST), Vol. 3 No. 1 Jan 2011
  15. Vijay Chandramouli, "A Detailed Study on Wireless LAN Technologies", 23. 10. 2002
  16. "Understanding the New WPA TKIP Attack Vulnerabilities & Motorola WLAN Countermeasures", Motorola, Inc. 2008.
  17. Dajiang He, Charles. Q. Shen. "Simulation study of IEEE 802. 11e EDCF" 2003
  18. Ismahnsi Binti Ismail, "Study of Enhanced DCF(EDCF) in Multimedia Application", 2005
  19. Preeti Venkateswaran, "Experiments to Develop Configurable Protocols", 2005
  20. Mark Greis, Tutorial for the Network Simulator "ns" 2008
  21. Lecture notes 2003-2004 University de Los Andes, Merida, Venezula and ESSI Sophia-Antipols, France.
  22. Guillermo Alonso Pequeño Javier Rocha Rivera, "Extension to MAC 802. 11 for performance improvement in MANET", 2007
  23. Sam De Silva, Using TCP "Effectively in Mobile Ad-hoc Wireless Networks with Rate Adaptation", 2007
  24. Turkan Ahamad & Manar Younis "The Enhancement of Routing Security in Mobile Ad-hoc Networks", IJCA(0975 – 888),Volume 48– No. 16, June 2012.
  25. Payal Pahwa, Gaurav Tiwari, Rashmi Chhabra "Spoofing Media Access Control (MAC) and its Counter Measures", IJAEA, Jan. 2010 .
  26. Farhad Soleimanian & Zeinab Abbasi "Analysis and Evaluation of Dynamic Load Balancing in IEEE 802. 11b Wireless Local Area" , IJCA(0975 – 888), Volume 47– No. 22, June 2012.
  27. Joshua Wright "Detecting Wireless LAN MAC Address Spoofing", 2003.
  28. Fanglu Guo and Tzi-cker Chiueh " Sequence Number-Based MAC Address Spoof Detection", 2005.
  29. Stuart Compton, SANS Institute, "802. 11 Denial of Service Attacks and Mitigation", May 2007.
  30. D. Gupta, G. Tiwari,Y. K and P. Kumar "Media Access Control (MAC) MAC Spoofing and its Counter Measure", IJRTE, 2009
  31. Siemens Enterprise Communications, "WLAN Security Today: Wireless more Secure than Wired", white paper July 2008.
  32. Website :http://computer. howstuffworks. com, Aug. 2012
  33. Website :http:// milesweb. com , Aug 2012
  34. Website : http://www. technitium. com, Aug 2012
  35. Website : http://www. klcconsulting. net/smac.
  36. Website: http://www. softpedia. com/ get/ Network-Tools/ IP-Tools/ IPScan-II. shtml
  37. Website : http://ip-scan. qarchive. org/, May 2012
  38. Website : ww. radmin. com/products/ipscanner, May 2012
  39. Website : http://www. angryip. org/w/Home, May 2012
  40. Website : http://www. opnet. com/itguru-academic
  41. Website : http://www. wikipedia. org. Aug 2012.
  42. Website : http://www. aircrack-ng. org. Aug 2012
  43. Website : http://www. makeuseof. com
  44. website : http://Microsoft. com/india, Aug 2012
  45. Website :http:/ Cisco. com aug 2012
  46. Richa Bansal, Siddharth Tiwari, Divya Bansal "Non-cryptographic methods of MAC spoof detection in wireless LAN", ICON 2008: 1-6.
  47. Guenther Lackner, Udo Payer, and Peter Teu, " Combating Wireless LAN MAC-Layer Address Spoofing with Fingerprinting Methods", January 20, 2009.
  48. Hassene Bouhouche & Sihem Guemara, "A QoS-based Resources Reservation Mechanism for Ad Hoc Networks", IJCA (0975 – 8887), Volume 6– No. 3, September 2010
  49. CERT-In Monthly Security Bulletin- February 2012, website : http://www. cert-in. org. in
  50. Mohd. Izhar, Mohd. Shahid & Dr. V. R. Singh"A Practical Approach for Evaluation of Security Methods of Wireless Network" unpublished.
  51. Mohd. Izhar, Mohd. Shahid & Dr. V. R. Singh, " Reliable and Secure wifi Performance model by way of cryptography and RSNA" in-press
  52. Mohd. Izhar, Mohd. Shahid & Dr. V. R. Singh, "Network Security Vulnerabilities heading for malicious attack" IJCA Special Edition for CTNGC 2012, Nov 2012
Index Terms

Computer Science
Information Sciences

Keywords

WLAN CSMA/CA CCMP TKIP and MAC