0% found this document useful (0 votes)
93 views

Assignment-! DCN

The document discusses developing IEEE security standards for wireless networks and TCP/IP networks. For wireless networks, it discusses the 802.11 wireless standards including 802.11a, 802.11b, and 802.11g which specify protocols for wireless LANs. It also discusses a proposed hierarchical architecture for wireless LAN security management. For TCP/IP networks, it discusses security issues and introduces cryptography algorithms like Blowfish, Elgamal, and MD5 that can be used to enhance TCP/IP security. It proposes adding a security layer between the transport and application layers to implement an Application Layer Security Protocol for TCP/IP networks.

Uploaded by

PPPPP
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views

Assignment-! DCN

The document discusses developing IEEE security standards for wireless networks and TCP/IP networks. For wireless networks, it discusses the 802.11 wireless standards including 802.11a, 802.11b, and 802.11g which specify protocols for wireless LANs. It also discusses a proposed hierarchical architecture for wireless LAN security management. For TCP/IP networks, it discusses security issues and introduces cryptography algorithms like Blowfish, Elgamal, and MD5 that can be used to enhance TCP/IP security. It proposes adding a security layer between the transport and application layers to implement an Application Layer Security Protocol for TCP/IP networks.

Uploaded by

PPPPP
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Assignment-1 DCN

Develop the IEEE security standards implementation for digital communication


networks focusing on:
(a) WLAN security
INTRODUCTION:
Wireless Ethernet (or Wi-Fi) security management is a challenging area of increased interest
due to the widespread deployment of Wireless LANs (WLANs) and their well-known
vulnerabilities to various types of attacks, as well as stringent scalability requirements in the
dynamic wireless domain. Until the adoption of the latest security standards is complete, users
and network assets on deployed WLANs, such as 802.11a/b/g networks, need to be protected
from existing security threats without depending on the latest features. In addition, while new
standards can protect the unauthorized use of network resource for outsiders, they do not deal
with the misuse or misbehaviors by insiders. In this paper we present a hierarchically
distributed policy-based system architecture and prototype implementation for WLAN security
management. The architecture includes a central policy engine that validates policies and
computes new configuration settings for network elements when access policies are violated,
distributed wireless domain policy managers with consistent local policy autonomy that
coordinate dedicated local monitors so as to monitor and control multi-vendor WLAN access
points (APs). The local monitors include wireless intrusion detection modules and wireless AP
interface adaptors. Although in this paper we focus on wireless security aspects, the overall
architecture can be applied to end-to-end security management of wireline and wireless
networks

IEEE 802.11 Wireless Standards:


The IEEE breaks their principles into different advisory groups. The IEEE 802 Committee
manages Local and Metropolitan Area Networks. The 802 arrangement of norms is broken into
7 working gatherings that emphasis on explicit issues inside the general order of LANs and
MANs [9].
Coming up next is a rundown of a portion of the 802 working gatherings.

 802.1: Bridging and Management


 802.2: Logical Link Control
 802.3: CSMA/CD Access Method
 802.4: Token-Passing Bus Access Method
 802.7: Broadband LAN
 802.11: Wireless
The 802.11 Working Group was shaped in September of 1990. Their objective was to make a
remote LAN detail that will work in one of the Industrial, Scientific, and Medical (ISM)
recurrence runs, the primary 802.11 standard was discharged in 1997 [17]. The 802 gauges
Assignment-1 DCN

address the lower levels of the OSI model. The 802.11 conventions address the Medium Access
Control (MAC) and Physical (PHY) layers autonomously. The MAC layer handles moving
information between the connection layer and the physical medium. Figure 2-2 delineates how
the lower layers of the OSI model coordinate to the ideas sketched out in the 802 arrangement
of conventions. There are various PHY norms being used these days. The first 802.11 detail
reported three unique systems: Infrared (IR), 2.4 GHz Frequency Hopping Spread Spectrum
(FHSS), and 2.4 GHz Direct Sequence Spread Spectrum (DSSS). Every one of these components
gave 1 or 2 Mbps information rate contingent upon the sign quality.

Fig 1: The OSI layers and corresponding 802 structure

The specific groups and tasks


concerning wireless networking
hardware standards are as
follows:
The specific groups and tasks concerning wireless networking hardware
standards are as follows:
802.11a:
802.11a [18], released in 2001, works in the 5 GHz go. It gives a piece pace of up to 54 Mbps
and utilizations a regulation strategy called Orthogonal Frequency Division Multiplexing
(OFDM). A few merchants have restrictive executions that twofold the bit pace of 802.11a to
102 Mbps

802.11b
802.11b [19, 22], released on 1999
802.11b:
Assignment-1 DCN

802.11b [19, 22], released on 1999, determined another PHY that gave a higher piece rate
utilizing DSSS in the 2.4 GHz go. 802.11b can transmit information up to 11 Mbps however will
downsize to 1 Mbps dependent on conditions. Because of the higher piece rate and expanded
interpretability, 802.11b has increased quick sending. Interoperability between various 802.11
items is tried and ensured by Wireless Ethernet Compatibility Alliance (WECA3) and their
confirmation mark is Wi-Fi.
802.11g:
802.11g [20] operates in the same 2.4 GHz range as 802.11b but uses OFDM like 802.11a.
Operating at up to 22 Mbps, it is seen as the middleman between 802.11b and 802.11a
standards.

This Table summarizes the 802.11 PHY specifications. 802.11b is currently the most deployed
type of wireless LAN and is used in the experimentation part of this research.

Table: PHY specifications

(b) TCP/IP security


INTRODUCTION:
The Internet has promptly formed into a tremendous worldwide system utilized by a huge
number of clients and constrained by different regulatory substances. System security is
essentially worried about shielding delicate information from unapproved clients and
applications. In any case, in the present situation various methodologies are frequently drawn
nearer to make sure about the information. With the expanding utilization of the Internet for
business applications, quality assistance is in extraordinary interest. Applications that are
developing step by step require steady control conventions to give QOS. Therefore, the
requirement for security on the Internet is more grounded than any time in recent memory.
The present Internet framework depends on the TCP/IP convention suite in which IP was not
actualized remembering security. A great deal of security issues exists in the TCP/IP model
Assignment-1 DCN

where the host relies upon the IP source address for verification. IPv4 is the present system
layer convention of the TCP/IP model [1].

TCP/IP PROTOCOL SUITE:

The TCP/IP convention suite, otherwise called the Internet convention suite, is an industry
standard intended for enormous systems in which system fragments are interconnected by
switches. It is a convention that is the establishment for the present Internet. The TCP/IP
convention suite was created before the OSI model. Subsequently, the layers in the TCP/IP
convention suite don't correspond with the layers in the OSI model. The TCP/IP convention
suite comprises of five layers, for example, physical, information interface, system, transport,
and applications. The initial four layers offer physical measures, organize interfaces,
Internetwork, and transport works that comply with the initial four layers of the OSI model. The
three highest layers of the OSI model are spoken to in TCP/IP [1] as a layer called the
application layer. TCP/IP is a various leveled convention planned as intuitive modules, every
one of which gives a usefulness; however, the modules are not really free. Where the OSI
model determines which capacity has a place with every one of its layers, the layers of the
TCP/IP convention suite contain generally autonomous conventions that can be blended and
coordinated relying upon the need of the framework.

CRYPTOGRAPHY:
Cryptography is a science that utilizes numerical estimations to encode and unscramble
information. It likewise permits clients to store delicate data or communicate it on unbound
Assignment-1 DCN

systems. With the goal that it cannot be perused by anybody aside from the planned
beneficiary. While giving protection stays a focal objective, numerous others have been
associated with this region, including different objectives of correspondence security, for
example, not ensuring the honesty and validness of interchanges, however some more.

1. Blowfish

Blowfish is a variable-length, 64-piece square figure. The calculation comprises of two sections:
a key-expansion part and an information encryption part. The key expansion part totally
changes over the key of 448 bits into a few sub keys exhibits in 4168 bytes. Blowfish utilizes
many sub keys. These keys must be tallied before any information encryption or unscrambling.

2. Elgamal

It is an open private encryption calculation, where every client has an open key and a relating
private key. The open key can be utilized to encode information; however, the private key is
utilized to decode the information. On the off chance that the sender distributes its open key,
everybody can encode a message utilizing the sender's open key, however just the sender can
decode the message. The calculation depends on the Diffie Hellman key understanding. The
elgamal calculation is broke down in numerous situations. The examination shows the hearty
idea of the calculation. Key or information is extremely hard to break. Elgamal encryption
actualized utilizing three segments, for example, key generator, encryption calculation and
decoding calculation.

3. MD5 Algorithm

The MD5 checksum for a record is a 128-bit esteem, something like a unique mark of the
document. There is a little chance of getting two indistinguishable checksums of two unique
records. This element can be helpful both for looking at the documents and their
trustworthiness control. We start by assuming that we have a b-bit message as information,
and that we wish to discover its message digest. Here b is a subjective nonnegative whole
number; b might be zero, it need not be a various of eight, and it might be discretionarily huge.

PROPOSED ARCHITECTURE:
In the proposed framework, a layer called security layer is incorporated between the vehicle
layer and the application layer. In the security layer, we proposed a security convention
called Application Layer Security Protocol (ALSP). It was planned so that it gives extremely
Assignment-1 DCN

high security to applications in the application layer.

The ALSP design utilizes three cryptography calculations to give better security. The first
plaintext Pt is scrambled utilizing Blowfish encryption. The keyk utilized for encryption is
encoded utilizing algal encryption. At that point the figure content CT alongside the figure key
CT will be sent to the goal. Simultaneously the message digest for plain content will
Assignment-1 DCN

be determined utilizing MD5. At that point the message summary to be encoded utilizing algal
encryption

The main key toward the finish of the beneficiary is unscrambled utilizing algal decoding. The
following figure content with the got key is decoded. Simultaneously the message digest is
determined utilizing MD5. The message digest got from the finish of the source is then
contrasted with the determined review at the beneficiary side. The ALSP engineering that is
proposed here gives symmetric and hilter kilter cards to give all parts of system security, for
example, secrecy, honesty, validation, non-renouncement, accessibility, and access control.

SIMULATION RESULTS:
Execution is a significant piece of the TCP/IP convention suite. To show the presentation for the
proposed engineering, a progression of reenactment runs are performed on various sorts of
information. In our reenactment, we utilize an Intel P-IV 1.60 GHz CPU, 512 MB RAM in which
execution result is gathered. Numerous exhibition measurements are utilized, for example,
encryption time, unscrambling time, CPU process time, CPU. clock cycles and battery power.

From the investigation, it shows that the proposed design has somewhat low execution when
contrasted with the current TCP/IP engineering. It likewise shows that the execution time of
encryption calculation is high which a significant explanation behind the absence of execution.

With the outcomes from Figure 4, a reasonable methodology is required to upgrade the
exhibition of the proposed engineering. The recreation shows that the exhibition of the
proposed framework can be expanded if the execution time of the encryption calculation is
diminished. In the proposed design, two encryption calculations to be specific Idea and Algal
were utilized. This is thought about in IDEA encryption. Thought calculation is assessed along
these lines to diminish execution time. Before long we will adjust the IDEA encryption
calculation to decrease the execution time. In any case, the security part of the proposed
Assignment-1 DCN

calculation has been incredibly improved. Cryptoanalysis is acted in a scrambled document. It


was discovered that it is hard to break a scrambled document with this calculation.

CONCLUSION:
I have underlined the requirement for security for existing TCP/IP models. It likewise gives new
plans to structuring proficient security instruments for the TCP/IP convention suite. With a
slight change in the present model, a more elevated level of insurance can be accomplished.
Some potential applications remember applications for the application layer, for example,
document move, email, telnet, and so forth.

Design the TLS handshake performed during transiting across internet browsers.
Introduction:
Transport Layer Security, or TLS, is a generally embraced security convention intended to
encourage protection and information security for interchanges over the Internet. An essential
use instance of TLS is scrambling the correspondence between web applications and servers,
for example, internet browsers stacking a site. TLS can likewise be utilized to scramble different
correspondences, for example, email, informing, and voice over IP (VOIP). In this article we will
concentrate on the job of TLS in web application security.
TLS encryption can help shield web applications from assaults, for example, information
penetrates, and DDoS assaults. Furthermore, TLS-ensured HTTPS is rapidly turning into a
standard practice for sites. For instance, the Google Chrome program is getting serious about
non-HTTPS destinations, and ordinary Internet clients are beginning to turn out to be
increasingly careful about sites that do not highlight the HTTPS lock symbol.

TLS can be utilized on a vehicle layer security convention like TCP. There are
three primary segments to TLS:
Assignment-1 DCN

 Encryption: conceals the information being moved from outsiders.


 Authentication: guarantees that the gatherings trading data are who they guarantee
to be.
 Integrity: checks that the information has not been manufactured or messed with.
A TLS association is started utilizing a grouping known as the TLS handshake. The TLS handshake
sets up a figure suite for every correspondence meeting. The figure suite is a lot of calculations
that indicates subtleties, for example, which shared encryption keys, or meeting keys, will be
utilized for that specific meeting. TLS can set the coordinating meeting keys over a decoded
channel on account of an innovation known as open key cryptography.
The handshake additionally handles verification, which as a rule comprises of the server
demonstrating its personality to the customer. This is finished utilizing open keys. Open keys
are encryption keys that utilization single direction encryption, implying that anybody can
unscramble information scrambled with the private key to guarantee its genuineness, yet just
the first sender can encode information with the private key.
When information is encoded and verified, it is then marked with a message validation code
(MAC). The beneficiary would then be able to confirm the MAC to guarantee the
trustworthiness of the information. This is somewhat like the carefully designed foil found on a
container of ibuprofen; the purchaser realizes nobody has altered their medication in light of
the fact that the foil is flawless when they buy it.

TLS affect web application performance:


Due to the intricate procedure associated with setting up a TLS association, some heap time and
computational force must be consumed. The customer and server must impart to and from a
few times before any information is transmitted, and that eats up valuable milliseconds of
burden times for web applications, just as some memory for both the customer and the server.
Fortunately, there are advances set up that help to alleviate the slack made by the TLS
handshake. One is TLS False Start, which lets the server and customer begin transmitting
information before the TLS handshake is finished. Another innovation to accelerate TLS will be
TLS Session Resumption, which permits customers and servers that have recently conveyed to
utilize a truncated handshake.
These enhancements have assisted with making TLS an extremely quick convention that should
not perceptibly influence load times. Concerning the computational expenses related with TLS,
they are for the most part immaterial by the present guidelines. For instance, when Google
moved their whole Gmail stage to HTTPS in 2010, there was no requirement for them to
empower any extra equipment. The additional heap on their servers because of TLS encryption
was under 1%.

Implementing TLS on a website:


Assignment-1 DCN

All Cloudflare users automatically have HTTPS protection from Cloudflare. Via Universal SSL,
Cloudflare offers free TLS/SSL certificates to all users. Anyone who does not use Cloudflare will
have to acquire an SSL certificate from a certificate authority, often for a fee, and install the
certificate on their origin servers.

You might also like