Beruflich Dokumente
Kultur Dokumente
Abstract:
There is no such area where we can say that technology is not implemented. It is just like
driving a car without steering. At present we have internet which is widely used tool, and the
new wireless technologies like Wi-Fi, WiMax ,Bluetooth etc are making information
communication technology service accessible affordable to all.
Wi-Fi has become a “fascination, a glimpse of the future” of the internet .The growth of
broadband network is taking over the cable-based communication. This tool is intergraded
with TVs, Mobiles, systems etc. In the near future no city or no any human being lives
without WiFi. Already some cities are providing wireless net facilities to their citizens with
low-cost or free of cost. For example, Pune is the first city in India to provide WiFi facility to
its citizens. As per NASSCOM prediction, WiFi may become so widespread that one can
access the net just anywhere at any time without using wires. This article tells about the WiFi
and the security measures be taken by the individuals to safeguard their data from
unauthorized users.
Introduction:
Wireless fidelity (WiFi) a threshold of the satyyuga hmmm…confused? Our epics tell us that
in earlier times sages used to connect and converse with thoughts, already we knew this from
our elders and read from so many puranas. The history repeats itself, the same method is now
given different terminologies called internet, Wi-Max 3G, wifi, Bluetooth, infrared etc.
In one word we can say life is nothing without technology. We can say for example,
housewife may utilize it for shopping, chatting and a student level he/she may utilize it for
educational purpose or games. It may be used for business transactions. One of the most
interesting areas is entertainment. Movies and music can be downloaded. The other areas are
the manufacturing industry and public sector. Wireless technology has facilitates extreme
mobility, aperture (opening), and ceaseless (boundless) possibilities for people who are
always on the budge (move) and yet desire to stay linked in the busy schedule. It can be also
deployed at conference room’s lounges outdoors and cafeterias. In addition to internet is there
any sophisticated and effective tool which is useful, faster and efficient in addition to
Internet? Yes, there are technologies such as WiMAX, 3G, 4G, and Bluetooth. Several
wireless technologies have been developed ever since the quest for mobile/wireless
communication has started way back in 1940’s.The next question comes how efficiently or
effectively is the wireless technology is used? Is it used in the right method? How secured is
this system when implemented. As there are innovations and enhancements in the technology
there are also pros and cons to each innovation. It depends on the individual how he/she takes
it and utilizes it. By all means wireless network is a boon for us for getting things done faster
with the latest equipments but as we know the coin has two sides the other side of this coin is
infuriated (furious). Recall the 26/11 Mumbai attack it was a nightmare for this present era in
India. There are number of precautions to be taken to safeguard the system .For instance,
Firewalls is one of the tools, but this alone can no longer is enough to protect networks from
outside attacks and malicious behavior of intruders. Companies must go in search of new
methods that secure network traffic and productivity. Development in the field of technology
has a high impact on the present scenario .IT sector is using Network-based IDS (Intrusion
Detection System) products, but have fallen short on technology promises because of lack of
security. Unwanted activity and malicious threats are unfortunate realities for most of the
Organizations these days. Intrusion Prevention, Securing Network Traffic and Productivity
have become a mandatory requirement for anyone who needs to prevent such attacks in their
day-to-day operations.
Proposed Work:
Several wireless technologies have been developed since the last decades and have become
all pervasive in or day to day lives. The day to day development from wire network i.e.
internet, phone etc to wireless network like wifi, Bluetooth etc play a crucial role in
constructing or destroying the system. Wi-Fi is the only technology that enables the use of
Wifi or Wireless Fidelity or Wifi or Wi-Fi is a popular name given to WLAN technology said
to be a wireless system that can be globally used for accessing the internet. Other than
internet Wi-Fi is integrated in more devices like laptops, PDAs, mobile phones. It is an Open-
standard wireless radio-wave technology technically known as IEEE 802.11b or also called as
Wi-Fi. This system was projected by the “Wi-Fi Alliance; a trade group” that lead the way for
commercialization of the technology. Wi-Fi is usually a plug ‘n play device in which the
connection is radiated from the router i.e. which is available easily to the user at any outlet by
connecting it to the end-users broadband network and create a hotspot of approximately 15-
20 feet . If we compare this to Ethernet protocol it uses high frequency radio signals to
transmit and receive data over distances of a few hundred feet. The area coverage is usually
300 meters so may be your neighbors may also use it with out your knowledge
People such as Police and emergency work force use wireless sets simultaneously. One
junction station named wireless routers, which is similar to the switch or router generally we
see in computer labs, is the important component. The Data is transmitted into the
considered higher than the frequencies used for walkie-talkies, cordless phones, TVs and
mobiles phones. The higher frequency is capable of carrying more Data. This connection is
convenient, virtually invisible and fairly reliable. However, if the router fails or if too many
people try to use high-bandwidth applications at the same time, users can experience
Basically a laptop or computer wireless adaptor transforms the given data in to a radio signal
and transmits it using the antenna then a wireless 802.11 router receivers it and decodes. The
WiFi router sends the information to the internet by using wired (Ethernet) connection. Vis-à-
vis.
802.11 Network standards are capable of supporting data rated upto 2 Mbps and allows
wireless workstations upto roughly several hundred feet away to communicate. The other
flavors are:
1. 802.11a: It transmits 54 Mbps at the rate of 5 GHz frequency. This uses OFDM
coding techniques which spilts; the radio signals into several sub-signals before they
comparatively slow and least expensive standard and it transmits 2.4GHz frequency.
3. 802.11g: The feature of this is that it transmits data at the speed up to 54Mbp and is
more striking than 802.11a and also faster because it uses OFDM coding but uses
4. 802.11n: As it is the most up-to-date standard it improves the speed and the range
compared to the above networking standards, from the point of speed it achieves
Do we really know who's using our wireless network without our knowledge and permission?
The network is prone to intrusion and misuse by unauthorized personnel. When we purchase
WiFi router we are provided with a default password, usually ‘1234’. The other default
passwords given are such as '0000', '5555' or ‘9999’ which are never changed by the user in
If the user has not changed the default network name or admin password someone could be
Macintosh with AirPort gear, Windows with any Wi-Fi equipment, or a Wi-Fi handheld such
as iPhone —the user is prone to risk unless they take precautionary steps. The hackers
identify an open network using their laptop and try all the default passwords. If the passwords
If we go through the present scenario, a majority of the networks are insecure. According to
Bluetooth enabled devices which transfers the information virtually. It uses low-power,
telephones, notebooks, computers, cameras, printer’s coffee makers etc which is rapidly
being built in to computers and other devices. Bluetooth LAN is an ad hoc network which
can be connected to the Internet. It serves as wire and cable-free wireless connection to
peripheral devices. It usually operates at one Mbps and has an effective range between 10 to
100 mtrs With 2.4-GHz bandwidth which means that there is a possibility of interface
between the IEEE 802.11b wireless LAN’s and Bluetooth LAN. The drawback of this
• The Delhi and Ahmedabad blast reveals us about the hacking of unsecured WiFi
networks used by Indian Mujhahideen to send out the terror e-mail. The terrorists
took advantage of insecure networks. Before the Ahmedabad blast, terrorists had used
• The other case was of Sarika Kamath, wife of K M Kamath from whose Internet
Protocol address the terror mail was sent around the time of the Delhi serial blasts has
Wi-Fi uses radio links instead of cables to connect computers which are more vulnerable and
still a risk factor about whether WiFi wireless technology is secure and protected. The
personal data is also on risk which is used by the latestly known ‘evil twin’. These hackers
easily clone a Wi-Fi signal and establish a fake connection and starts to extract the data from
the user’s hard disk. Once the authenticated user logs on hi/her system the page is hijacked.
Action plan
Right click on small wireless network icon on your Task Bar, below u can see a icon marked
in red:
We can see a small window select or click the option “view Available Wireless Networks”.
After we select the option we can see a window in which WiFi networks is there. Here we
will find a WiFi router name which can be given by the any authorized user say “Surya
Systems” wireless network which is ‘Unsecured wireless network’. Here we can find that
there is no lock on the SS wireless network which means it is not secured , if it is secured
then u can see a option on Surya System as ‘Security-enabled wireless network’. After the
completion of the above steps the following guidelines are to be kept in mind .
1. Disabling the SSID (Service Set Identifier) broadcast: through SSID there is a
chance of filtering some of the intruders to detect the WiFi access point. For the most
security, type a random collection of letters and numbers, and don't give it a name that
2. Enable MAC address filter. Each network interface has a unique MAC address, in
essence a serial number--called a MAC address by filtering it, one can to an extent
The drawback of this security feature is it is only applicable for wireless PC’s,
because the wired PC’s are already installed with this feature.
Privacy) encryption. Use WPA (or WPA-PSK): The two most common types of
encryption are WEP and WPA. The system works by using an access point to block
LAN
access until the user can be identified by entering a pass code if all devices on your
network support it. Otherwise use 128-bit WEP. This protects the access between the
4. Change default admin passwords for access points: like you can change the default
internet at your home or office, the wireless signals of the router work till 60-70 feet
without walls or restriction and any person within this range can connect to the
wireless router and use your internet connection .Keep the router in the middle of the
6. Most of the WiFi at home and offices are kept on for 24 hours, it is recommended that
the WiFi is turned off when not in use and also when out of stations or on vacations.
7. Use Encryption: It is suggestable to use WPA than WEP, which encryption method is
misunderstood because there are chances that the data may be captured by some
unauthorized user.
We should frequently change your SSID or ESSID. The SSID or ESSID is basically
just a name that’s assigned to the wireless access point. The reason why it is important
to change the SSID or ESSID is because we don’t want your access point to have an
If we want to limit access of the machine MAC address we can open the command
prompt window on the workstation and enter the command IPCONFIG/ALL and know
The Wi-Fi users either an individual or business person can safeguard their information from
hacking and restricting the perpetrators by making sure that the laptop or the desktop they are
using , are secured by updating the latest firewall, antivirus and anti-spy ware software. The
user must always make sure before connecting to the WiFi is that the site which is to be
viewed is an authenticated web page and has been provided access to VPN (Virtual Private
Network.). The precaution which can be taken by the end-user is avoided to log in to the
financial accounts or any important data. One of the common mistakes usually done by the
user is that he/she uses the same password for online transaction as it is easy to remember for
him. The user must see that he does not directly get connected to the wireless network
Conclusion:
Even though the technology is showing its new and courageous face, we have to make use of
these techniques for the best of our efforts. We know that merits and demerits are the two
parallel lines on which the efforts of the technology can be based upon. We need to give due
weightage to the merits by considering the aforesaid do’s and don’ts. If we are able to
provide the strong fencing to our systems, it will surely obstruct the perpetrators from
committing malicious threats, through logical or physical access. There is one more
sophicated Wireless Mess known as, Bluetooth which is a wireless system that allows the
secured surfing makes our life a “bed of roses” with this wireless technology.
References:
3. http://www.dirjournal.com/internet-journal/fbi-safety-tips-for-wi-fi-users
5. www.rediff.com/news
6. www.computer.howstuffworks.com/wireless-network
7. www.windowssecurity.com/articles
8. The Mobile Corporation ushering the wireless Advantage: S.Jaya Krishna, Anil
Kumar Sivudu
9. www.mumbaimirror.com
10. sandeep Junnarkar , “one way to get online:piggyback” N.Y.Times, august 26,2004
11. www.en.wikipedia.org/wiki/Wi-Fi –
12. The Wireless Networking “Starter Kit, the Practical Guide to Wi-Fi Networks for
INC-Vijayawada.