Wireless Networking Technologies and Security Research Paper by Nicky

An in-depth exploration of wireless networking technologies and security protocols, standards and operations.
# 149794 | 7,153 words | 19 sources | APA | 2011 | US

$19.95 Buy and instantly download this paper now


The paper examines the capabilities of wireless personal area networks (WPANs), wireless local area networks (WLANs) and wireless wide area networks (WWANs). The paper describes the advantages and limitations of wireless networks in accommodating goals, objectives and requirements in government and/or academic environments. Finally the paper identifies a security protocol which relates to these wireless network technologies.

Purpose of the Study
WPAN Security
P2P Wireless Technology
Radio and 3G Cellular
Security Challenges, Risks and Approaches
Proactive Wireless Self-Protection System - Anomaly-Based Security
Identified Solution -Anomaly-Based Solutions

From the Paper:

"Kennedy and Hunt relate that BlueSnarf is the process entailing unsolicited content being sent to Bluetooth enabled devices and just as in Bluejacking, BlueSnarf attempts to mimic authentication dialogues causing the user to being tricked into disclosing their access codes and allowing the attacker to read access to a vulnerable device thus enabling them to access the calendar and phone book without authentication. This attack is reported to have recently been upgraded to BlueSnarf++ making the use of the Object Exchange FTP service in connecting to devices which are vulnerable and allowing the attacker read write access for the device's file system in its entirety as well as that of any memory extensions including such as memory sticks. The third attack in this area is related by Kennedy and Hunt as being that of what is known as 'BlueBump' which exposes a weakness in the "handling of Bluetooth link keys, giving devices that are no longer authorized the ability to access services as if still paired. It can lead to data theft or the use of mobile Internet connectivity services, such as Wireless Application Protocol." (Kennedy and Hunt, 2008, p.1)
"Another attack referred to as Bluesmack is a Denial of Service (DOS) attack "that can be performed with standard tools such as Linux Bluez utils package." (Kennedy and Hunt, 2008, p.1) This attack is stated to be similar to that known as 'Ping of Death' because it targets the L2CAP layer, which can request another Bluetooth peer echo."

Sample of Sources Used:

  • Alexiou, A., Antonellis, D., & Bouras, C. (2006). Evaluating different one to many packet delivery schemes for UMTS. Proceedings of the 2006 international symposium a world of wireless, mobile and multimedia networks. Washington DC, USA, 8, 7-72
  • Amaldi, E., Capone, A., & Malucelli, F. (2008). Radio planning and coverage optimization of 3G cellular networks. Wireless Networks 14 (4), 435-447.
  • Canton, J. (2008). "Top ten trends: The top ten trends in the future of security - what is coming?". Retrieved on 6/6/09 from http://www.globalfuturist.com/about-igf/top-ten-trends/trends-in-security.html
  • Chang, C., Huang, C., & Ho., C. (2008). Capacity based compressed mode control algorithm for inter-system measurements in UMTS system. Wireless Networks 14 (3), 403-413.
  • Fang, W. Du, L. Fang, and Ning, L. (2005) Localization anomaly detection for wireless sensor networks". Proc. International Parallel and Distributed Processing Symposium, 2005

Cite this Research Paper:

APA Format

Wireless Networking Technologies and Security (2012, January 01) Retrieved May 11, 2021, from https://www.academon.com/research-paper/wireless-networking-technologies-and-security-149794/

MLA Format

"Wireless Networking Technologies and Security" 01 January 2012. Web. 11 May. 2021. <https://www.academon.com/research-paper/wireless-networking-technologies-and-security-149794/>