Wireless Network Security Issues

In the time span of just a few years, wireless networking has emerged from a novelty to revolution. The speed with which wireless networking has caught on is not surprising owing to large bandwidth and range of several hundred feet. Moreover multiple wireless access points can be easily installed on same network to cover more areas. Our main challenge in design of these networks is their exposure to security attacks. Routing protocols for wireless networks are still an active research area. There is no single standard routing protocol. Therefore we aim to consider common security threats into account to provide guidelines to secure routing protocols. In this paper a study has been carried out for the threats on wireless networks and security goals to be achieved. http://dx.doi.org/10.14429/dbit.25.1.3645

[1]  Moti Yung,et al.  Proactive RSA , 1997, CRYPTO.

[2]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[3]  Stephen T. Kent,et al.  Securing the Nimrod routing architecture , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.

[4]  Gene Tsudik,et al.  Lowering security overhead in link state routing , 1999, Comput. Networks.

[5]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[6]  Sheila Frankel Demystifying The Ipsec Puzzle , 2001 .

[7]  William Stallings,et al.  Data and Computer Communications , 1985 .

[8]  Hugo Krawczyk,et al.  Robust and Efficient Sharing of RSA Functions , 1996, CRYPTO.

[9]  J.J. Garcia-Luna-Aceves,et al.  Securing the border gateway routing protocol , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.

[10]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[11]  R. Perlman,et al.  An overview of PKI trust models , 1999, IEEE Netw..

[12]  J. J. Garcia-Luna-Aceves,et al.  Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.

[13]  Armando Fox,et al.  Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.

[14]  Brijesh Kumar,et al.  Integration of security in network routing protocols , 1993, SGSC.

[15]  Moti Yung,et al.  Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[16]  Hugo Krawczyk,et al.  Robust and Efficient Sharing of RSA Functions , 1996, Journal of Cryptology.

[17]  Li Gong,et al.  Increasing Availability and Security of an Authentication Service , 1993, IEEE J. Sel. Areas Commun..