scholarly journals Security of Mobile and Wireless Networks

10.28945/2491 ◽  
2002 ◽  
Author(s):  
Kaj J. Grahn ◽  
Göran Pulkkis ◽  
Jean-Sebastien Guillard

This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN/2, IPSec and Bluetooth, are included. A local area network, MediaPoli, has been implemented to work as a testbed for new innovations, products and services. The development environment is based on this high-capacity wired/wireless broadband network. Key research areas, actual projects and offered services are discussed. All activities aim at the future information society.

Author(s):  
Göran Pulkkis

In a wired local area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003). The fast development of wireless technologies implies that wireless communications will become ubiquitous in homes, offices, and enterprises. In order to conserve power and frequency spectrum, the wireless device computation overhead is most often reduced. The conventional security design thus uses smaller keys, weak message integrity protocols, and weak or one-way authentication protocols (Hardjono & Dondeti, 2005). WLAN security thus requires a more reliable protection of data communication between WLAN units and strong access management mechanisms.


2008 ◽  
pp. 1349-1360
Author(s):  
Göran Pulkkis ◽  
Kaj Grahn ◽  
Jonny Karlsson

In a wired local-area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data-transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003).


1995 ◽  
Vol 1 (2) ◽  
pp. 161-174 ◽  
Author(s):  
K. Y. Eng ◽  
M. J. Karol ◽  
M. Veeraraghavan ◽  
E. Ayanoglu ◽  
C. B. Woodworth ◽  
...  

Author(s):  
Osman Goni

A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.


1990 ◽  
Vol 5 (2) ◽  
pp. 63-72 ◽  
Author(s):  
Rodger Jamieson ◽  
Graham Low

This paper provides a framework for the review of security and control within a local area network environment. Network operations are subdivided into several functional areas or components for further review. Each component or area is briefly explained and the security risks, issues and concerns highlighted. Controls and security measures are proposed as guidelines to counter these threats. An approach to the audit of each major area of network operations is proposed. This suggested framework provides guidance to information system security officers, auditors, communications and network administrators, consultants and information systems management for the review of local area network security during network operations.


2020 ◽  
Vol 34 (18) ◽  
pp. 2050198
Author(s):  
Ravindra Arya ◽  
Deepak K. Raghuvanshi

In this communication, design of asymmetrical multiple open slot loaded microstrip antenna for WiBro/WiMAX/WLAN band operation is presented. The substrate material is chosen as FR4 ([Formula: see text], [Formula: see text]) and fed by coaxial feeding. This antenna is able to radiate at four resonating bands. The antenna is radiating between 2.29 and 2.39 GHz, which is suitable for Wireless Broadband, WiBro. In parallel to this design, this antenna is also radiating in (5.16–5.36 GHz and 5.725–5.825 GHz) range which cover Wireless Local Area Network, WLAN (5.2/5.8 GHz) bands. Moreover, this antenna is radiating in (3.28–3.65 GHz, 5.45–5.65 GHz) range which is suitable for Worldwide Interoperability for Microwave Access, WiMAX (3.5/5.5) GHz bands. Measured results have proven that there is a good agreement with the simulated results of farfield patterns, reflection coefficient, peak gain of the proposed asymmetrical multiple open slot loaded microstrip antenna. The volume of this design is [Formula: see text]. Radiation pattern is noticed as stable at all obtained resonating frequencies. Maximum gain of 4.2 dBi is achieved between 3.28 and 3.65 GHz frequency band.


Author(s):  
CHRISTINE STRAUSS ◽  
CHRISTIAN STUMMER

Security issues in information management are increasingly moving towards the centre of corporate interests. This paper presents a multiobjective modelling approach that interactively assists IT managers in their attempts to reduce a given risk by evaluating and selecting portfolios (i.e. bundles) of security measures. The proposed multi-step procedure identifies attractive portfolio candidates and finally establishes the "best" one with respect to the decision-maker's preferences. Our model and its possible application are demonstrated by means of a numerical example based on real-world data that evaluates the risk of hacking faced by a Local Area Network in an academic environment.


Author(s):  
Göran Pulkkis ◽  
Kaj J. Grahn ◽  
Jonny Karlsson

In a wired local-area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data-transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003).


Author(s):  
Cristinel Marius VASILE

Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.


Sign in / Sign up

Export Citation Format

Share Document