Data security in wireless networks: A Review

Transcription

Data security in wireless networks: A Review
International Journal of Innovative and Emerging Research in Engineering
Volume 2, Issue 3, 2015
Available online at www.ijiere.com
International Journal of Innovative and Emerging
Research in Engineering
e-ISSN: 2394 - 3343
p-ISSN: 2394 - 5494
Data security in wireless networks: A Review
Mr. Pranav Soochik
Student of Third Year of Computer Engineering,
Shri Sant Gadge Baba College of Engineering and Technology, Bhusawal,
North Maharashtra University, Jalgaon, Maharashtra, India
[email protected]
ABSTRACT:
In today’s technological era the uses of wireless networks is very essential for the growth & development in
all sectors. With this rapid growth in use of wireless network it is very important to look forward toward the
data security issues in wireless network. Security in networks either in wired or in wireless it is very important
to protect our information or data from attacks like session high-jacking or replay attacks. Different types of
wireless network & security methods are available in market. I am going to discuss the overview of wireless
network world and trying to show the security issues and data security in wireless networks such as symmetric
and asymmetric encryption, cryptography method, block cipher and stream cipher etc.
Keywords: wireless networks, attacks, security.
I.
INTRODUCTION
When we start discuss about the uses of wireless networks in today’s technological era, first we thought about the
security issues about data privacy and risk of unauthenticated users. In next sub-point we had discussed about the wireless
world as an overview and in next main points we had discussed about wireless data attacks and security goals.
A. THE WIRELESS WORLD
Wireless data networks have spread between home users and corporations in an growing way. The main reason behind
this fast adaptation is due to the nature of wireless networks where it provides the flexibility and freedom that wired
networks shortage. The rising of bandwidth capabilities has inspired people to think seriously about replacing wired
networks with wireless networks especially in places where it is hard or exclusive to have wired networks [6]. One of the
main places that can benefit from these ideas is rural zones where wired networks infrastructure is either difficult or
impossible to create due to physical difficulties. The main standards in the wireless world are: 802.11, which describe the
Wireless LAN design and 802.16 which describes the Wireless MAN design. These two wireless networks are usually
known by two acronyms: Wi-Fi (Wireless Fidelity) to be a sign of WLAN and WiMAX (Worldwide Interoperability for
Microwave Access) to describe WMAN. [3]
1. WIRELESS LAN (WLAN)
Wireless LAN is simply trying to imitate the structure of the wired LANs using alternative standard to transfer data quite
than cables. This standard is electromagnetic waves which are mainly either radio frequency (RF) or infrared frequency
(IR).Wireless LANs consist mainly of two entities: clients or end-user devices and Access Points (AP) [3] as shown in
figure 1.
Figure 1: Wireless WLAN
2. WIRELESS MAN (WMAN)
The idea behind using WMAN is to offer a broadband Internet service using wireless substructure. The idea is very
analogous to a TV broadcast network (shown in Fig). The theoretical speed of WMAN is 75Mbps lengthy to several miles,
which offer an additional to cable and DSL connections in the future [3].As shown in the figure 2.
96
International Journal of Innovative and Emerging Research in Engineering
Volume 2, Issue 3, 2015
Figure 2: Wireless WMAN
B. INTRODUCTION TO WIRELESS SECURITY
This section outlines some of the basic beginnings in the security world. It starts by describing the goals behind
implementing security in the computer world Then it discuss encryption and decryption concept, the implementation of
both block and stream ciphers, and finally a brief description of the most common encryption standards[6].
II.
WIRELESS NETWORKS ATTACKS
Security in computer world governs the capability of the system to manage, protect and distribute sensitive info. Data
Security was initiate many years before the advent of wireless communication due to the mankind's need to send
information (in war or in peace time) without exposing its content to others. The first and most known machine (Enigma)
was used in WWII by the German military to encrypt their mails. The machine was something similar to a simple typing
machine with a scrambler unit to obscure the content of the messages [6]. From that time till now, many solutions to
security extortions have been familiarized, and most of them were abandoned or replaced by better security criteria. These
ongoing changes supported the security field to be a perpetual hot topic. In the wireless world security extortions were not
known to public people till prices of wireless equipment went down about 2000. Afore that date, the military was the
number one client for wireless security products especially during the cold war.
A. SECURITY ATTACKS
Below is a list of the most common attack kinds known in both wired and wireless networks. Most of the security attacks
and extortions are listed under the following categories [6].
1. Traffic Analysis
In this type of attacks the attacker uses the statistics of network connectivity and activity to find information about the
attacked networks. The Information includes AP location, AP SSID and the kind of protocol used by the study of size and
types of Packets.
2. Passive Eavesdropping
Attackers in this type set themselves in snuffling way, where they listen to all the network traffic hoping to quotation
information from it. This kind of attack is only useful with unencrypted networks and stream cipher encrypted ones.
3. Active Eavesdropping
It is related to passive eavesdropping but the attacker tries to change the data on the packet, or to insert a complete packet
in the stream of data.
4. Session High-Jacking
The attacker attacks the dishonesty of the session by trying to hijack an authorized session from an authorized user.
5. Replay Attacks
In this kind of attack the attacker uses the information from earlier authenticated sessions to gain access to the network.
III.
WIRELESS NETWORKS SECURITY GOALS
Every security system must provide a bundle of security functions that can assure the privacy of the system. These
functions are typically referred to as the goals of the security system. These aims can be planned under the following main
types
Authentication: This means that before sending and receiving data by the system, the receiver and sender identity should
be confirmed and verified.
Secrecy or Confidentiality: Usually this function (feature) is how most people identify a safe system. It means that simply
the authenticated people are able to interpret the message or date content and no one else.
Integrity: Integrity means that the content of the communicated data is assured to be free from any type of alteration
between the end points sender and receiver. The basic procedure of integrity is packet check sum in IPv4 packets.
Non-Repudiation: This function implies that neither the sender nor the receiver can falsely deny that they have sent a
certain message.
97
International Journal of Innovative and Emerging Research in Engineering
Volume 2, Issue 3, 2015
Service Reliability and Availability: Since secure systems typically get attacked by intruders which may affect their
availability and kind of service to their users. Such systems should offer a system to grant their users the quality of service
they expect [6].
A. DATA ENCRYPTION
To send data securely among two nodes, the system must encrypt the data or systematically scramble info so that it
cannot be read without knowing the coding key [9].As shown in figure 3.
Figure 3: Data encryption and decryption
1. SYMMETRIC ENCRYPTION
In this type of encryption, the sender and the receiver agree on a secret key. Then they use this secret key to encrypt and
decrypt their sent mails Node A and B mainly on the encryption technique to be used in encryption and decryption of
interconnected data. Then they approve on the secret key that both of them will use in this connection. After the encryption
system finishes, node A starts sending its data that is encrypted with the key. On the other side at node B uses the same
shared key to decrypt the encrypted messages [3].
2. ASYMMETRIC ENCRYPTION
Asymmetric encryption is the further kind of encryption where two keys are used, to describe more, what Key1 can
encrypt only and Key2 can decrypt, vice versa. It is also known as Public Key Cryptography (PKC) because users tend to
use two keys are public key, which is known to the public and another one is private key which is known only to the user.
After approving on the type of encryption to be used in the connection, node B sends its public key to A. A node uses the
received public key to encrypt its mails. Then when the encrypted mails reach, node B uses its private key to decrypt them
[3].
B. BLOCK CIPHER
In this process data is encrypted and decrypted if from of blocks. In its meekest type, you divide the simple text into
blocks which are then fed into the cipher system to products Blocks of cipher text. There are various variances of block
cipher, where altered methods are used to strengthen the security of the system. The furthermost common methods are:
ECB (Electronic Codebook Mode) &CBC (Chain Block Chaining Mode), and OFB (Output Feedback Mode), ECB is the
simple method of clock cipher where data blocks are encrypted openly to generate its correspondent ciphered blocks. CBC
mode usages the cipher block from the earlier step of encryption in the current one which forms a chain-like encryption
process, OFB operates on simple text in away similar to stream cipher that will be described below, where the encryption
key used in each step depends on the encryption key from the earlier step [4].As shown in figure 4.
98
International Journal of Innovative and Emerging Research in Engineering
Volume 2, Issue 3, 2015
Figure 4: Block cipher ECB mode
C. STREAM CIPHER
Stream cipher functions on a stream of data by working on it bit by bit. Stream cipher contains of two major components:
a key stream generator and a mixing function. the Mixing function is usually just an XOR function while key stream
generator is the main unit in stream cipher encryption method. For example, if the key stream generator products a series
of zeros, as the output ciphered stream will be matching to the original simple text [4].As shown in figure 5.
Figure 5: Stream cipher- Simple mode
IV.
CONCLUSION
I have discussed about the wireless networks with their uses, described the security attack issues and data security goals
plan list for wireless network and also discussed about the data security methods using in today’s trend such as symmetric
and asymmetric data encryption, about cipher text process and we conclude that we can’t control other the session hijacking
techniques or data loss completely by a single method or technique, we need to develop our data privacy techniques for
various security attacks & hacking.
ACKNOWLEDGMENT
I feel great pleasure in submitting this paper on “Data security in wireless networks: A Review”. I would like to thank
my honorable Principal, Dr. R. P. Singh, and special thanks to Head of Department and my guide Prof. D. D. Patil &
sincere thanks to all the respected teaching faculties of department of computer science & engineering of shri sant gadge
baba college of engineering and technology bhusawal(M.H.), INDIA.
REFERENCES
[1] Peng Bao, Ma Liang, “A Security Localization method based on Threshold and Vote for wireless sensor networks”
procedia engineering 5 (year 2011).
[2] N.S. Fayed, E.M. Daydamoni, A. Atwan, “Efficient combined security system for wireless sensor network”,
Egyptian Informatics Journal (2012) 13, 185–190.
[3] Abidalrahman Moh’da, Hosein Marzib, Nauman Aslam, “A Secure Platform of Wireless Sensor Networks”, the
2nd International Conference on Ambient Systems, Networks and Technologies, procedia engineering 5 (2011).
[4] Fang-Jiao Zhanga, b, Li-Dong Zhaia,*, “Sinkhole attack detection based on redundancy mechanism in wireless
sensor networks”, Information Technology and Quantitative Management (ITQM 2014).
[5] Zhijun Xie*, 1, 2, Guangyan Huang2, Jing He2, Yanchun Zhang2, “A Clique-Based WBAN Scheduling for
Mobile Wireless Body Area Networks”, Information Technology and Quantitative Management (ITQM 2014).
[6] Gaurav Sharmaa* Suman Balaa, Anil K. Vermaa, “Security Frameworks for Wireless Sensor Networks-Review”,
2nd International Conference on Communication, Computing & Security [ICCCS-2012].
99