WNS Article
WNS Article
Santosh K. Pandey
Department of Information Technology
Board of Studies, The Institute of Chartered Accountants of India, Noida- 201301
E Mail: [email protected]
Signals in wireless networks are omni directional and spread beyond the desired coverage
area. Due to this weakness, many active and passive methods are available for doing
attacks in wireless network transmission. Inserting the data into wireless networks or
modifying any transmitted data is called active method whereas passive methods include
monitoring the traffic in promiscuous mode to get information about wireless networks.
With the availability of various software, it is very easy to attack on wireless networks.
Major security threats which are possible in wireless networks are as follows:
· Spoofing Threat:
Another major threat in wireless networks is ‘MAC Address Spoofing’ which
alters the manufacture assigned MAC address to any other value. This is
conceptually different than traditional IP address spoofing where an attacker
sends data from any arbitrary source address and does not expect to see a response
to their actual source IP address. An attacker may choose ‘MAC Address
Altering’ for several reasons, e.g. to bypass access control list, to impersonate an
already authenticated user or disguising his/her presence on the network.
· Jamming Threat:
One of the most famous security threats for wireless networks is jamming. In this,
the attacker operates on the same frequency and channel of the target network.
He/she operates at higher power, thus disabling the actual access point.
Sometimes, the network arrives at standstill position and user fears that network is
attacked. This may happen because other equipments use microwave signals, e.g.
microwave oven or remote controls, cordless phones, etc.
In this article, various security threats of wireless networks are discussed. We have also
tried to analyze them and see ‘how different software tools help the attacker to do attack
in wireless networks’. Intelligent access points can have better control and can impose
better security constraints. In future, we may have clients with secure authentications by
default and the intelligent access points having the user profile and working pattern
known. Hence, it will be able to differentiate the attacker from a normal user. Hence, it
becomes necessary to have an standardized hardware and software combined solution to
overcome these security threats in wireless networks.