Wireless Security


Can anyone help me. I have been ask to do a project on wireless network security which I totally don't know what is that.

Can anyone advise how should i start going about to know what it is all about.

What are the basics that I should know.
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Pete LongTechnical ConsultantCommented:
Hi violetray,
Lots of people are interested in wireless LAN security nowadays. Given that level of interest, there's a need for accurate information on how the current standards work, what's wrong with them, and the current thinking on how to fix the problems. This page tries to gather relevant papers and standards in a single place.

Trends and overview
Ethernet Everywhere
Ethernet is on the verge of becoming the preferred technology for LAN (wired and wireless), SAN, MAN and WAN.  Increasing in speed by an order of magnitude every 3 years, "Ethernet Everywhere" could be to the next decade what "IP everywhere" was to the 1990s.
IEEE 802.1X "network Port Authentication" was designed to scale with Ethernet, adding no per-packet overhead, and bringing the management technology of dialup networks to the wired and wireless LAN worlds. Here are presentations on the current trends in Ethernet network access, both wired and wireless, and an introduction to IEEE 802.1X and its applications.


Pete LongTechnical ConsultantCommented:
Wireless LAN Security FAQ
Pete LongTechnical ConsultantCommented:
Wireless Network Security

Discover the Answer to Productive IT

Discover app within WatchGuard's Wi-Fi Cloud helps you optimize W-Fi user experience with the most complete set of visibility, troubleshooting, and network health features. Quickly pinpointing network problems will lead to more happy users and most importantly, productive IT.

Pete LongTechnical ConsultantCommented:
Exploiting and Protecting 802.11b Wireless Networks
Pete LongTechnical ConsultantCommented:
inetd: Getting the most out of WEP
John C. Welch
Monday, August 6, 2001

So, I've read yet another article on how someone has managed to hack the Wired Equivalent Privacy (WEP) encryption for 802.11b wireless networks, aka Wi-Fi and Airport. Once again, the clamor rises that the IEEE is using shoddy encryption, and that they are leaving the poor consumers and users of 802.11b networks open for the foulest kind of violations.

Well, that's only partially true, and most of the panic arises from an essential misunderstanding of what WEP is, and some less than perfectly forthright marketing by the wireless networking dealers.

What WEP isn't and is ............


Pete LongTechnical ConsultantCommented:
If your wireless LAN is located in a single family home, then you are probably more at risk from intruders coming in via your Internet connection than from folks gaining access to your LAN over the air.  But if your LAN has some means of wireless connectivity, you've added another way to access your LAN that doesn't require getting past your router's firewall and doesn't even require physical access!

Pete LongTechnical ConsultantCommented:

The basics could be:

Compare LAN and WLAN. Try to figure out the difference between two (besides "there is no cable"). AP-switch, WLAN client-lan client.

You'll see that the only difference that matters is Layer1, the CABLE. Since info goes all around anyone can listen to it. There are several means to protect your network. First, configure the devices correctly, perhaps disable the DHCP, specify new passwords (the longer the better). Than implement WEP on AP (again the longer the better). You can limit access on AP,so it  only allows specified MAC addresses to access the AP. On top of all, you can encrypt everything with IPSec.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Pete LongTechnical ConsultantCommented:
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
OS Security

From novice to tech pro — start learning today.