Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30172
A New Approach of Wireless Network Traffic on VPN

Authors: Amir Rashid, M. Saleem Khan, Freeha Zafar

Abstract:

This work presents a new approach of securing a wireless network. The configuration is focused on securing & Protecting wireless network traffic for a small network such as a home or dorm room. The security Mechanism provided both authentication, allowing only known authorized users access to the wireless network, and encryption, preventing anyone from reading the wireless traffic. The mentioned solution utilizes the open source free S/WAN software which implements the Internet Protocol Security –IPSEC. In addition to wireless components, wireless NIC in PC and wireless access point needs a machine running Linux to act as security gateway. While the current configuration assumes that the wireless PC clients are running Linux, Windows XP/VISTA/7 based machines equipped with VPN software which will allow to interface with this configuration.

Keywords: Wireless network security, security network, authentication, encryption and internet protocol security.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1084192

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1541

References:


[1] S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling algorithm of RC4. In Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, Canada, Aug. 2001
[2] N. Borisov, I. Goldberg, and D.Wagner. Intercepting mobile communications: The insecurity of 802.11. MOBICOM 2001 (2001)
[3] S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. RFC 2401. The Internet Society, November 1998. http://www.rfceditor. org
[4] R. Thayer, N. Doraswamy, and R. Glenn. IP Security Document Roadmap. RFC 2411. The Internet Society, November 1998. http://www.rfc-editor.org
[5] D. Harkins, and D. Carrel. The Internet Key Exchange (IKE). RFC 2409. The Internet Society, November 1998. http://www.rfc-editor.org
[6] D. Maughan, M. Schertler, M. Schneider, and J. Turner. Internet Security Association and Key Management Protocol (ISAKMP). RFC 2408. The Internet Society, November 1998. http://www.rfc-editor.org
[7] S. Kent and R. Atkinson. IP Encapsulating Security Payload (ESP). RFC 2406. The Internet Society, November 1998. http://www.rfc-editor.org
[8] C. Brian Grimm. Wi-fi Protected Access - Overview. Wi-Fi Alliance. 2002http://www.wi-fi.org/OpenSection/pdf/Wi- Fi_Protected_Access_Overview.pdf. Viewed Nov. 7, 2002