Research Inventy : International Journal of Engineering and Science

I

Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.

Research Inventy: International Journal Of Engineering And Science
Vol.3, Issue 7 (August 2013), PP 01-05
Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com
1
Securing Wi-Fi Network Via Proxy Servers
Surbhi Gupta1
, Puneet Bhalla1
1.
Department of Computer Science , Dronacharaya college of engg., Gurgaon
ABSTRACT : “Unsecured wi-fi network (genetically known as Wireless Local Area Network or WLAN) has
become a national celebrity in vamp category due to it’s misuse by terrorists, in the recent past.Even otherwise,
any open and unsecured node, especially wireless,is an extremely serious security hazard for any network,
whether it is corporate, personal, home or small office user. Wi-fi networks are in the news in the recent past
due to effective misuse of these by terror organisations. They have been misused asthese wireless (wi-fi)
networks have been installed unsecured. Withthe misuse by terrorists, unsecured wi-fi misuse has become
national celebrity in villain and vamp categories.”
KEYWORDS: AES, DAIR, MAC, Proxy server, TKIP, WEP, WPA
I. INTRODUCTION
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide
wireless high-speed Internet and network connections. The Wi-Fi Alliance, the organization that owns the Wi-Fi
(registered trademark) term specifically definesWi-Fi as any "wireless local area network (WLAN) products
that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards."Initially, Wi-Fi
was used in place of the 2.4 GHz 802.11b standardonly, however the Wi-Fi Al liance has expanded the generic
use of the Wi-Fi term to include any type of network or WLAN product based on any of the 802.11 standards,
including 802.11b,802.11a, dual-band, and so on, in an attempt tostop confusionabout wireless LAN
interoperability.Wi-Fi works with no physical wiredconnection between sender andreceiver by using radio
frequency (RF) technology, afrequency within the electromagnetic spectrum associated with radio
wavepropagation. When an RF current is supplied to an antenna, an electromagnetic field is created that then is
able to propagate through air or space. The cornerstone of any wireless network is an access point (AP). The
primary job of an access point is to broadcast a wireless signal that computers can detect and "tune" into. In
order to connect to an access point and join a wireless network, computers and devices must be equipped with
wirelessnetwork adapters.Wi-Fi is supported by many appl ications and devices including video game consoles,
home networks, PDAs, mobile phones, major operating systems, and other types of consumer electronics.
Anyproducts that are tested and approved as "Wi-Fi Certified" (aregistered trademark) by the Wi-Fi Alliance are
certified asinteroperable with each other, even if they are from differentmanufacturers. For example, a user with
a Wi-Fi Certified productcan use any brand of access point with any other brand of clienthardware that also is
also "Wi-Fi Certified". Products that pass thiscertification are required to carry an identifying seal on
theirpackaging that states "Wi-Fi Certified" and indicates the radiofrequency band used (2.4 GHz for 802.11b,
802.11g, or 802.11n,and 5GHz for 802.11a).[1]
1.1.How to secure wi-fi and protect ourselves –
The question arises – what a person must do to take care that the wireless network (wi-fi) is not
misused by any anti-social, antinational or criminal element or anyone else, may be insider, who is not
authorised to access / use the network. The question is: how to secure your wireless network or wi-fi network
connection or access point (AP) .There are three important aspects of wireless (or any) security –
A. Wireless network must be technically reasonably secured.
B. User must be educated in security.
C. Security must be monitored for weaknesses and breaches.
1.2.Checklist to protect your wireless (wi-fi) network
1.2.1.Mandatory Controls –
1. Change Default Administrator Passwords and Usernames
2. Turn on (Compatible) WPA / WEP Encryption
3. Enable Firewalls On Each Computer and the Router
4. Disable Auto-connect feature
5. Position the Router or Access Point (AP) Safely
Securing Wi-fi Network Via...
2
6. Turn Off the power switch of Router/AP, when not in use
7. Assign Static IP Addresses to Devices
1.2.2.Desirable Controls -
8. Change the Default SSID
9. Disable SSID Broadcast
10. Enable MAC Address Filtering
II. SCOPE OF STUDY
Proxy server is a server (a computer system or an application) that acts as an intermediary for requests
from clients seeking resources from other servers. A client connects to the proxy server, requesting some
service, such as a file, connection, web page, or other resource available from a different server and the proxy
server evaluates the request as a way to simplify and control its complexity.[2]
A proxy server may run right on
the user's local computer, or at various points between the user's computer and destination servers on the
Internet.
 A proxy server that passes requests and responses unmodified is usually called a gateway or sometimes
a tunneling proxy.
 A forward proxy is an Internet-facing proxy used to retrieve from a wide range of sources (in most cases
anywhere on the Internet).
 A reverse proxy is usually an Internet-facing proxy used as a front-end to control and protect access to a
server on a private network, commonly also performing tasks such as load-balancing, authentication,
decryption or caching.[3]
2.1.Forward proxies
A forward proxy taking requests from an internal network and forwarding them to Internet.
Forward proxies are proxies where the client server names the target server to connect to.[3]
Forward
proxies are able to retrieve from a wide range of sources (in most cases anywhere on the Internet).The terms
"forward proxy" and "forwarding proxy" are a general description of behavior (forwarding traffic) and thus
ambiguous. Except for Reverse proxy, the types of proxies described in this article are more specialized sub-
types of the general forward proxy concept.
2.2.Open proxies
An open proxy forwarding requests from and to anywhere on the Internet.
An open proxy is a forwarding proxy server that is accessible by any Internet user. Gordon
Lyon estimates there are "hundreds of thousands" of open proxies on the Internet.[4]
Ananonymous open
proxy allows users to conceal their IP address while browsing the Web or using other Internet services. There
are varying degrees of anonymity however, as well as a number of methods of 'tricking' the client into revealing
itself regardless of the proxy being used.
Securing Wi-fi Network Via...
3
2.3.Reverse proxies
A reverse proxy taking requests from the Internet and forwarding them to servers in an internal network.Those
making requests connect to the proxy and may not be aware of the internal network.
A reverse proxy (or surrogate) is a proxy server that appears to clients to be an ordinary server. Requests are
forwarded to one or more origin servers which handle the request. The response is returned as if it came directly
from the web server.[3]
Reverse proxies are installed in the neighborhood of one or more web servers. All traffic
coming from the Internet and with a destination of one of the neighborhood's web servers goes through the
proxy server. The use of "reverse" originates in its counterpart "forward proxy" since the reverse proxy sits
closer to the web server and serves only a restricted set of websites.
III. RELATED WORK
3.1.A very rudimentary test to verify your wireless network iscompletely unsecured –
In the MS Windows environment, drag your mouse over the wireless icon in the bottom right corner
(this corner is called the “system tray”) of your computer screen. This wil l display the name of your wireless
network. If it shows the default name of the wireless network, as provided by the manufacturer, you have high
probability of having an unsecured network. In unsecured network, this may be the make or model of your
wireless router and you may seesomething like, "Linksys" or “D-Link” or "Default (Unsecured)". [Linksys,
3Com, Netgear, D-Link, Microsoft Broadband are brand names of some wireless (wi-fi) routers]. This test is
like a Thermometer test, which measures the body temperature only. Higher body temperature means some
abnormality but cannot diagnose it. At the same time, normal temperature does not mean that all is normal.
3.2.Encryption schemes
There are many methos available for the wi-fi security, many encryption schemes such as EAP,TKIP,
AES, WEP, WPA,WPA2 etc and many security tips are develeped.
3.2.1.AES:- Advanced Encryption Standard is gaining acceptance as appropriate replacement for RC4 algorithm
in WEP. AES uses the Rijandale Algorithm and supports the following key lengths-128 bit, 192 bit, 256 bit.
AES is considered to be un-crack able by most Cryptographers. NIST has chosen AES for Federal Information
Processing Standard (FIPS). In order to improve wireless LAN security the 802.11i is considering inclusion of
AES in WEPv2.
3.2.2.TKIP:- The temporal key integrity protocol (TKIP), initially referred to as WEP2, is an interim solution
that fixes the key reuse problem of WEP, that is, periodically using the same key to encrypt data. The TKIP
process begins with a 128-bit "temporal key" shared among clients and access points. TKIP combines the
temporal key with the client's MAC address andthen adds a relatively large 16-octet initialization vector to
produce the key that will encrypt the data. This procedure ensuresthat each station uses different key streams to
encrypt the data [5].
3.2.3.WEP: - The industry’s solution: WEP (Wired Equivalent Privacy) [7], [5], [8], [9], [10]
 Share a single cryptographic key among all devices
 Encrypt all packets sent over the air, using the shared key
 Use a checksum to prevent injection of spoofed packets [6].
Some devices support the various versions of WEP-
 WEP-64-bit key (sometimes called WEP-40)
 WEP 128-bit key (sometimes called WEP-104)
 WEP 256-bit key.
Securing Wi-fi Network Via...
4
3.2.4.WAP:-WAP stands for Wi-Fi Protected Access [7], [5], [8], [9], [10]. This standard was developed to
replace WEP. Wi-Fi devices typically support multiple variations of WPA technology. Traditional WPA, also
known as WPA-Personal and sometimes also called WPA-PSK (for pre-shared key), is designed for home
networking while another version, WPAEnterprise, is designed for corporate networks.WAP2 is an improved
version of Wi-Fi Protected Access supported by all newer Wi-Fi equipment. Like WPA, WPA2 alsoexists in
Personal/PSK and Enterprise forms [8].
3.3.Protocol stack
The protocol stack for WLANs was designed such that existing applications can use them with minor
modifications. The three layers are same to other networks:-application, transport and network layers are same.
Proxy server works on upper three layers but mostly on the application layer.Proxy server plays very important
role in LAN network , in the same way if we add the proxy server to WLAN than in the same way with the help
of proxy server can protect the WLAN network also .Proxy server in between the clients and server.Proxy server
is also known as“application level gateway”.proxy server provides increased performance and security. In the
proxy server the data enters through one port and is forwarded to another port or the rest of the network.
Basically proxy server plays the two important role:-
3.3.1. Performance impovement:-Proxy servers saves the requests for a certain time period. Hence the
performance increases dramatically for a group of users.for example if a person p request for a web page ,after
some time another person q requests the same site than the proxy server returns the same web page for person q
that it already fetched for the person p,instead of forwarding the request to the server. Hence the time will be
saved .
3.3.2. Filteration:-Proxy severs can also povides the facility of the filtering. Porxy server povides the content
filteringapplication i.e. they control the content that may be relayed either in one direction or in the both
directions.Proxyserver can filter the requests.for example in school or in colleges certain web sites are blocked
or we can not open some web sites this can also be done with the help of the proxy servers.
3.4.Practical Aproach
A slew of products for securing corporate networks are available in the market. Firewalls prevent
unauthorized users from gaining access to the network . IDSs detect compromised machines in the network
.IPSec secures the communication channel between two authorized machines , and is frequently used byVPN
software. While these techniques are effective in reducing the number of attacks from outside the corporate
network, they do not secure the Wi-Fi network against the attacks. In particular, none of these can detect rogue
Wi-Fi devices and DoS attacks on Wi-Fi networks. The use of VPNs and IPSec is often not sufficient, as we
discussed earlier. IDS products usually detect compromised machines once the attack is launched, and most
have a high false positive rate, which significantly reduces their usefulness from the perspective of a network
administrator. In comparison, the DAIR security management system detects andlocates rogue Wi-Fi devices
and various DoS attacks with few false positives and minimal human intervention.There are several commercial
products in the area of corporate Wi-Fi security . Most use one of two approaches:they either rely on APs or
they use dedicated and expensive custom hardware sensors for RF monitoring. The marketing literature of these
products contains few technical details. Some commercial products rely on APs for monitoring wireless
networks . Although cost effective, this approach has several limitations. First, a single-radio AP can not easily
monitor multiple channels since its primary function requires it to spend most of its time on one specific channel
serving associated clients. Second, the APs usually have limited CPU power and memory resources, so polling
them (i.e., issuing SNMP queries) too frequently is problematic. Third, an AP only provides a view of one end
of the wireless communication, so an AP-based solution can not be used to detect problems such as RF holes or
excessive interference that primarily affect the client end of the communication. Finally, , monitoring the
network from an AP alone does not provide comprehensive coverage. To overcome these limitations, some
vendors augment the AP-based monitoring by deploying special sensor nodes throughout the organization .
However, such specialized sensors are expensive, and require careful planning for an effective deployment. We
are aware of only one prior research paper on detecting rogue devices . In this, mobile clients and APs monitor
the network and detect rogue devices. Cisco’s Wireless LAN Solution Engine uses a similar approach . The
proposed scheme has a few limitations. First, it is difficult to guarantee complete coverage because the
monitoring sensors are mobile. Second, the amount of RF monitoring and reporting depends on the battery of
the mobile clients. Third, the algorithm proposed in Adya et al. flags any unknown AP as a rogue device, even
if the AP is not plugged into the corporate network. Fourth, the proposed techniques do not detect rogue ad hoc
networks, and finally, the previous work does not detect DoS attacks on Wi-Fi networks.There is some prior
research on detecting greedy and malicious behavior in IEEE 802.11 networks. Bellardo et al. presenta study of
Securing Wi-fi Network Via...
5
various DoS attacks in IEEE 802.11 networks. Theydemonstrate the attacks, and present simple schemes to
counter them. The solution requires clients to cooperate with each other and in some cases, changes to IEEE
802.11. DAIR, on the other hand, detects these faults and reports them to the network administrator. The
detection framework for DAIR is more efficient due to the presence of a larger number of sensors.DOMINO is
an AP based solution for detecting greedy behavior in IEEE 802.11 hotspots . Several other researchers have
proposed monitoring and characterization of wireless networks by polling the Aps.These systems have the same
drawbacks as other AP based solutions discussed earlier. The benefits of dense sensor deployments were
presented in Conner et al. The focus of that paper was on environmental monitoring applications such as
temperature control or locating empty meeting rooms, and not Wi-Fi monitoring.
IV. CONCLUSION
WI-FI networks are growing day by day. The new challenges or we can say the security risks are also
increases day to day.We can impove the performance as well as the security with the help of proxy server ,if it is
implemented successfully.we can secure the WI-Fi network upto 5-10% with the help of the proxy server.
REFERENCES
[1] http://www.webopedia.com/TERM/W/Wi_Fi.html
[2] http://en.wikipedia.org/wiki/Proxy_server.
[3] Forward and Reverse Proxies". httpd mod_proxy. Apache. Retrieved 20 December 2010.
[4] Lyon, Gordon (2008). Nmap network scanning. US: Insecure. p. 270.ISBN 978-0-9799587-1-7.
[5] Wireless lan security today and tomorrow by Sangram Goyal and Dr. S. A. Vetha Manickam Center for Information and Network
Security Pune University.
[6] Wireless security ppt by David Wagner.
[7] The State of Wi-Fi® Security Wi-Fi CERTIFIED™ WPA2TM Delivers Advanced Security to Homes, Enterprises and Mobile
Devices by Wi-Fi Alliance.
[8] Introduction to Wi-Fi Network Security By Bradley Mitchell .
[9] Sara Nasre Wireless Lan Security Research Paper IT 6823 Information Security Instructor: Dr. Andy Ju An Wang Spring 2004.
[10] WI-FI security –WEP, WPA and WPA2 by Guillaume Lehembre.

Recomendados

SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS von
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISIJNSA Journal
41 views17 Folien
Wireless security presentation von
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
40.5K views21 Folien
Wireless security von
Wireless securityWireless security
Wireless securityparipec
1.5K views34 Folien
Wireless network security von
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
3.5K views19 Folien
Securing the Use of Wireless Fidelity (WiFi) in Libraries von
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesPhilippine Association of Academic/Research Librarians
1.2K views51 Folien
WLAN Attacks and Protection von
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
1.4K views13 Folien

Más contenido relacionado

Was ist angesagt?

Wireless Lan Security von
Wireless Lan SecurityWireless Lan Security
Wireless Lan SecuritySANDEEPONSLIDESHARE
1.3K views10 Folien
Latest Developments in WirelessNetworking and Wireless Security von
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
312 views4 Folien
Wireless Network Security von
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
1.1K views16 Folien
WLAN SECURITY BY SAIKIRAN PANJALA von
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALASaikiran Panjala
204 views18 Folien
Workshop on Wireless Security von
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
3.5K views45 Folien
Cisco discovery d homesb module 7 - v.4 in english. von
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
1.3K views7 Folien

Was ist angesagt?(20)

Latest Developments in WirelessNetworking and Wireless Security von IOSR Journals
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
IOSR Journals312 views
Wireless Network Security von kentquirk
Wireless Network SecurityWireless Network Security
Wireless Network Security
kentquirk1.1K views
Workshop on Wireless Security von amiable_indian
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian3.5K views
Cisco discovery d homesb module 7 - v.4 in english. von igede tirtanata
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
igede tirtanata1.3K views
Understanding WiFi Security Vulnerabilities and Solutions von AirTight Networks
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
AirTight Networks4.4K views
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De... von IRJET Journal
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
Wireless LAN Security Attacks and CCM Protocol with Some Best Practices in De...
IRJET Journal47 views
Security Delivery Platform: Best practices von Mihajlo Prerad
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
Mihajlo Prerad924 views
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK von IJNSA Journal
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
IJNSA Journal104 views
Wifi cracking Step by Step Using CMD and Kali Linux 2018 von Mohammad Fareed
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Mohammad Fareed1.3K views

Destacado

Research Inventy : International Journal of Engineering and Science von
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
428 views12 Folien
A0420105 von
A0420105A0420105
A0420105inventy
175 views5 Folien
D044027038 von
D044027038D044027038
D044027038inventy
417 views12 Folien
Research Inventy : International Journal of Engineering and Science von
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
316 views7 Folien
Research Inventy : International Journal of Engineering and Science von
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
185 views7 Folien
D043025035 von
D043025035D043025035
D043025035inventy
158 views11 Folien

Destacado(17)

Research Inventy : International Journal of Engineering and Science von inventy
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy428 views
A0420105 von inventy
A0420105A0420105
A0420105
inventy175 views
D044027038 von inventy
D044027038D044027038
D044027038
inventy417 views
Research Inventy : International Journal of Engineering and Science von inventy
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy316 views
Research Inventy : International Journal of Engineering and Science von inventy
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy185 views
D043025035 von inventy
D043025035D043025035
D043025035
inventy158 views
Research Inventy : International Journal of Engineering and Science von inventy
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy221 views
C04216020 von inventy
C04216020C04216020
C04216020
inventy221 views
E0312020029 von inventy
E0312020029E0312020029
E0312020029
inventy181 views
D032021027 von inventy
D032021027D032021027
D032021027
inventy452 views
Research Inventy : International Journal of Engineering and Science von inventy
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy331 views
Research Inventy : International Journal of Engineering and Science von inventy
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy231 views
C041027036 von inventy
C041027036C041027036
C041027036
inventy553 views
Research Inventy : International Journal of Engineering and Science von inventy
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy245 views
A043001006 von inventy
A043001006A043001006
A043001006
inventy122 views
G043055064 von inventy
G043055064G043055064
G043055064
inventy483 views
Research Inventy : International Journal of Engineering and Science von inventy
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy979 views

Similar a Research Inventy : International Journal of Engineering and Science

IJCER (www.ijceronline.com) International Journal of computational Engineerin... von
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
196 views5 Folien
Wireless LAN Deployment Best Practices von
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
2.4K views86 Folien
Ichci13 submission 104 (1) von
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
449 views7 Folien
Wi Fi Technology von
Wi Fi TechnologyWi Fi Technology
Wi Fi TechnologyAlok Pandey (AP)
826 views42 Folien
Wireless Security von
Wireless SecurityWireless Security
Wireless SecurityVignesh Suresh
65 views15 Folien
Tips For Securing Wireless Networks von
Tips For Securing Wireless NetworksTips For Securing Wireless Networks
Tips For Securing Wireless NetworksJennifer Brown
3 views48 Folien

Similar a Research Inventy : International Journal of Engineering and Science(20)

IJCER (www.ijceronline.com) International Journal of computational Engineerin... von ijceronline
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline196 views
Wireless LAN Deployment Best Practices von Michael Boman
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
Michael Boman2.4K views
Wireless+LAN+Technology+and+Security+Vulnerabilities von Yogesh Kumar
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar329 views
The Wireless Library Palinet Spring2005 von Bill Drew
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
Bill Drew528 views
Security Issues of 802.11b von guestd7b627
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
guestd7b627392 views
Security Issues of IEEE 802.11b von Sreekanth GS
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
Sreekanth GS3.5K views
Wireless Security Needs For Enterprises von shrutisreddy
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy359 views
Network Discovery Protocol ( Ndp ) von Sara Reed
Network Discovery Protocol ( Ndp )Network Discovery Protocol ( Ndp )
Network Discovery Protocol ( Ndp )
Sara Reed2 views
Viable means using which Wireless Network Security can be Jeopardized von IRJET Journal
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
IRJET Journal28 views
Pentesting Your Own Wireless Networks, June 2011 Issue von Ishan Girdhar
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar2.1K views
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles... von Lindsey Landolfi
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Lindsey Landolfi2.4K views

Más de inventy

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool... von
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...inventy
267 views6 Folien
Copper Strip Corrossion Test in Various Aviation Fuels von
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuelsinventy
575 views3 Folien
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th... von
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...inventy
139 views7 Folien
Comparative Study of the Quality of Life, Quality of Work Life and Organisati... von
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...inventy
330 views7 Folien
A Study of Automated Decision Making Systems von
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systemsinventy
413 views4 Folien
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea... von
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...inventy
452 views6 Folien

Más de inventy(20)

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool... von inventy
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
inventy267 views
Copper Strip Corrossion Test in Various Aviation Fuels von inventy
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuels
inventy575 views
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th... von inventy
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
inventy139 views
Comparative Study of the Quality of Life, Quality of Work Life and Organisati... von inventy
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
inventy330 views
A Study of Automated Decision Making Systems von inventy
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systems
inventy413 views
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea... von inventy
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
inventy452 views
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ... von inventy
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
inventy2.5K views
Application of Kennelly’model of Running Performances to Elite Endurance Runn... von inventy
Application of Kennelly’model of Running Performances to Elite Endurance Runn...Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
inventy239 views
Development and Application of a Failure Monitoring System by Using the Vibra... von inventy
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...
inventy228 views
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko... von inventy
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
inventy284 views
Size distribution and biometric relationships of little tunny Euthynnus allet... von inventy
Size distribution and biometric relationships of little tunny Euthynnus allet...Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...
inventy95 views
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber... von inventy
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
inventy360 views
Effect of Various External and Internal Factors on the Carrier Mobility in n-... von inventy
Effect of Various External and Internal Factors on the Carrier Mobility in n-...Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
inventy153 views
Transient flow analysis for horizontal axial upper-wind turbine von inventy
Transient flow analysis for horizontal axial upper-wind turbineTransient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbine
inventy113 views
Choice of Numerical Integration Method for Wind Time History Analysis of Tall... von inventy
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
inventy189 views
Impacts of Demand Side Management on System Reliability Evaluation von inventy
Impacts of Demand Side Management on System Reliability EvaluationImpacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability Evaluation
inventy163 views
Reliability Evaluation of Riyadh System Incorporating Renewable Generation von inventy
Reliability Evaluation of Riyadh System Incorporating Renewable GenerationReliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
inventy143 views
The effect of reduced pressure acetylene plasma treatment on physical charact... von inventy
The effect of reduced pressure acetylene plasma treatment on physical charact...The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...
inventy84 views
Experimental Investigation of Mini Cooler cum Freezer von inventy
Experimental Investigation of Mini Cooler cum FreezerExperimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum Freezer
inventy245 views
Growth and Magnetic properties of MnGeP2 thin films von inventy
Growth and Magnetic properties of MnGeP2 thin filmsGrowth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin films
inventy176 views

Último

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 von
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
69 views8 Folien
Zero to Automated in Under a Year von
Zero to Automated in Under a YearZero to Automated in Under a Year
Zero to Automated in Under a YearNetwork Automation Forum
22 views23 Folien
MVP and prioritization.pdf von
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
37 views8 Folien
Mini-Track: Challenges to Network Automation Adoption von
Mini-Track: Challenges to Network Automation AdoptionMini-Track: Challenges to Network Automation Adoption
Mini-Track: Challenges to Network Automation AdoptionNetwork Automation Forum
17 views27 Folien
Future of Indian ConsumerTech von
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
24 views68 Folien
"Node.js Development in 2024: trends and tools", Nikita Galkin von
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin Fwdays
17 views38 Folien

Último(20)

【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 von IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
"Node.js Development in 2024: trends and tools", Nikita Galkin von Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays17 views
The Forbidden VPN Secrets.pdf von Mariam Shaba
The Forbidden VPN Secrets.pdfThe Forbidden VPN Secrets.pdf
The Forbidden VPN Secrets.pdf
Mariam Shaba20 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 von Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi139 views
Piloting & Scaling Successfully With Microsoft Viva von Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Five Things You SHOULD Know About Postman von Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman38 views
Business Analyst Series 2023 - Week 3 Session 5 von DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10345 views
Future of AR - Facebook Presentation von Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty22 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab23 views

Research Inventy : International Journal of Engineering and Science

  • 1. Research Inventy: International Journal Of Engineering And Science Vol.3, Issue 7 (August 2013), PP 01-05 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com 1 Securing Wi-Fi Network Via Proxy Servers Surbhi Gupta1 , Puneet Bhalla1 1. Department of Computer Science , Dronacharaya college of engg., Gurgaon ABSTRACT : “Unsecured wi-fi network (genetically known as Wireless Local Area Network or WLAN) has become a national celebrity in vamp category due to it’s misuse by terrorists, in the recent past.Even otherwise, any open and unsecured node, especially wireless,is an extremely serious security hazard for any network, whether it is corporate, personal, home or small office user. Wi-fi networks are in the news in the recent past due to effective misuse of these by terror organisations. They have been misused asthese wireless (wi-fi) networks have been installed unsecured. Withthe misuse by terrorists, unsecured wi-fi misuse has become national celebrity in villain and vamp categories.” KEYWORDS: AES, DAIR, MAC, Proxy server, TKIP, WEP, WPA I. INTRODUCTION Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. The Wi-Fi Alliance, the organization that owns the Wi-Fi (registered trademark) term specifically definesWi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards."Initially, Wi-Fi was used in place of the 2.4 GHz 802.11b standardonly, however the Wi-Fi Al liance has expanded the generic use of the Wi-Fi term to include any type of network or WLAN product based on any of the 802.11 standards, including 802.11b,802.11a, dual-band, and so on, in an attempt tostop confusionabout wireless LAN interoperability.Wi-Fi works with no physical wiredconnection between sender andreceiver by using radio frequency (RF) technology, afrequency within the electromagnetic spectrum associated with radio wavepropagation. When an RF current is supplied to an antenna, an electromagnetic field is created that then is able to propagate through air or space. The cornerstone of any wireless network is an access point (AP). The primary job of an access point is to broadcast a wireless signal that computers can detect and "tune" into. In order to connect to an access point and join a wireless network, computers and devices must be equipped with wirelessnetwork adapters.Wi-Fi is supported by many appl ications and devices including video game consoles, home networks, PDAs, mobile phones, major operating systems, and other types of consumer electronics. Anyproducts that are tested and approved as "Wi-Fi Certified" (aregistered trademark) by the Wi-Fi Alliance are certified asinteroperable with each other, even if they are from differentmanufacturers. For example, a user with a Wi-Fi Certified productcan use any brand of access point with any other brand of clienthardware that also is also "Wi-Fi Certified". Products that pass thiscertification are required to carry an identifying seal on theirpackaging that states "Wi-Fi Certified" and indicates the radiofrequency band used (2.4 GHz for 802.11b, 802.11g, or 802.11n,and 5GHz for 802.11a).[1] 1.1.How to secure wi-fi and protect ourselves – The question arises – what a person must do to take care that the wireless network (wi-fi) is not misused by any anti-social, antinational or criminal element or anyone else, may be insider, who is not authorised to access / use the network. The question is: how to secure your wireless network or wi-fi network connection or access point (AP) .There are three important aspects of wireless (or any) security – A. Wireless network must be technically reasonably secured. B. User must be educated in security. C. Security must be monitored for weaknesses and breaches. 1.2.Checklist to protect your wireless (wi-fi) network 1.2.1.Mandatory Controls – 1. Change Default Administrator Passwords and Usernames 2. Turn on (Compatible) WPA / WEP Encryption 3. Enable Firewalls On Each Computer and the Router 4. Disable Auto-connect feature 5. Position the Router or Access Point (AP) Safely
  • 2. Securing Wi-fi Network Via... 2 6. Turn Off the power switch of Router/AP, when not in use 7. Assign Static IP Addresses to Devices 1.2.2.Desirable Controls - 8. Change the Default SSID 9. Disable SSID Broadcast 10. Enable MAC Address Filtering II. SCOPE OF STUDY Proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity.[2] A proxy server may run right on the user's local computer, or at various points between the user's computer and destination servers on the Internet.  A proxy server that passes requests and responses unmodified is usually called a gateway or sometimes a tunneling proxy.  A forward proxy is an Internet-facing proxy used to retrieve from a wide range of sources (in most cases anywhere on the Internet).  A reverse proxy is usually an Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching.[3] 2.1.Forward proxies A forward proxy taking requests from an internal network and forwarding them to Internet. Forward proxies are proxies where the client server names the target server to connect to.[3] Forward proxies are able to retrieve from a wide range of sources (in most cases anywhere on the Internet).The terms "forward proxy" and "forwarding proxy" are a general description of behavior (forwarding traffic) and thus ambiguous. Except for Reverse proxy, the types of proxies described in this article are more specialized sub- types of the general forward proxy concept. 2.2.Open proxies An open proxy forwarding requests from and to anywhere on the Internet. An open proxy is a forwarding proxy server that is accessible by any Internet user. Gordon Lyon estimates there are "hundreds of thousands" of open proxies on the Internet.[4] Ananonymous open proxy allows users to conceal their IP address while browsing the Web or using other Internet services. There are varying degrees of anonymity however, as well as a number of methods of 'tricking' the client into revealing itself regardless of the proxy being used.
  • 3. Securing Wi-fi Network Via... 3 2.3.Reverse proxies A reverse proxy taking requests from the Internet and forwarding them to servers in an internal network.Those making requests connect to the proxy and may not be aware of the internal network. A reverse proxy (or surrogate) is a proxy server that appears to clients to be an ordinary server. Requests are forwarded to one or more origin servers which handle the request. The response is returned as if it came directly from the web server.[3] Reverse proxies are installed in the neighborhood of one or more web servers. All traffic coming from the Internet and with a destination of one of the neighborhood's web servers goes through the proxy server. The use of "reverse" originates in its counterpart "forward proxy" since the reverse proxy sits closer to the web server and serves only a restricted set of websites. III. RELATED WORK 3.1.A very rudimentary test to verify your wireless network iscompletely unsecured – In the MS Windows environment, drag your mouse over the wireless icon in the bottom right corner (this corner is called the “system tray”) of your computer screen. This wil l display the name of your wireless network. If it shows the default name of the wireless network, as provided by the manufacturer, you have high probability of having an unsecured network. In unsecured network, this may be the make or model of your wireless router and you may seesomething like, "Linksys" or “D-Link” or "Default (Unsecured)". [Linksys, 3Com, Netgear, D-Link, Microsoft Broadband are brand names of some wireless (wi-fi) routers]. This test is like a Thermometer test, which measures the body temperature only. Higher body temperature means some abnormality but cannot diagnose it. At the same time, normal temperature does not mean that all is normal. 3.2.Encryption schemes There are many methos available for the wi-fi security, many encryption schemes such as EAP,TKIP, AES, WEP, WPA,WPA2 etc and many security tips are develeped. 3.2.1.AES:- Advanced Encryption Standard is gaining acceptance as appropriate replacement for RC4 algorithm in WEP. AES uses the Rijandale Algorithm and supports the following key lengths-128 bit, 192 bit, 256 bit. AES is considered to be un-crack able by most Cryptographers. NIST has chosen AES for Federal Information Processing Standard (FIPS). In order to improve wireless LAN security the 802.11i is considering inclusion of AES in WEPv2. 3.2.2.TKIP:- The temporal key integrity protocol (TKIP), initially referred to as WEP2, is an interim solution that fixes the key reuse problem of WEP, that is, periodically using the same key to encrypt data. The TKIP process begins with a 128-bit "temporal key" shared among clients and access points. TKIP combines the temporal key with the client's MAC address andthen adds a relatively large 16-octet initialization vector to produce the key that will encrypt the data. This procedure ensuresthat each station uses different key streams to encrypt the data [5]. 3.2.3.WEP: - The industry’s solution: WEP (Wired Equivalent Privacy) [7], [5], [8], [9], [10]  Share a single cryptographic key among all devices  Encrypt all packets sent over the air, using the shared key  Use a checksum to prevent injection of spoofed packets [6]. Some devices support the various versions of WEP-  WEP-64-bit key (sometimes called WEP-40)  WEP 128-bit key (sometimes called WEP-104)  WEP 256-bit key.
  • 4. Securing Wi-fi Network Via... 4 3.2.4.WAP:-WAP stands for Wi-Fi Protected Access [7], [5], [8], [9], [10]. This standard was developed to replace WEP. Wi-Fi devices typically support multiple variations of WPA technology. Traditional WPA, also known as WPA-Personal and sometimes also called WPA-PSK (for pre-shared key), is designed for home networking while another version, WPAEnterprise, is designed for corporate networks.WAP2 is an improved version of Wi-Fi Protected Access supported by all newer Wi-Fi equipment. Like WPA, WPA2 alsoexists in Personal/PSK and Enterprise forms [8]. 3.3.Protocol stack The protocol stack for WLANs was designed such that existing applications can use them with minor modifications. The three layers are same to other networks:-application, transport and network layers are same. Proxy server works on upper three layers but mostly on the application layer.Proxy server plays very important role in LAN network , in the same way if we add the proxy server to WLAN than in the same way with the help of proxy server can protect the WLAN network also .Proxy server in between the clients and server.Proxy server is also known as“application level gateway”.proxy server provides increased performance and security. In the proxy server the data enters through one port and is forwarded to another port or the rest of the network. Basically proxy server plays the two important role:- 3.3.1. Performance impovement:-Proxy servers saves the requests for a certain time period. Hence the performance increases dramatically for a group of users.for example if a person p request for a web page ,after some time another person q requests the same site than the proxy server returns the same web page for person q that it already fetched for the person p,instead of forwarding the request to the server. Hence the time will be saved . 3.3.2. Filteration:-Proxy severs can also povides the facility of the filtering. Porxy server povides the content filteringapplication i.e. they control the content that may be relayed either in one direction or in the both directions.Proxyserver can filter the requests.for example in school or in colleges certain web sites are blocked or we can not open some web sites this can also be done with the help of the proxy servers. 3.4.Practical Aproach A slew of products for securing corporate networks are available in the market. Firewalls prevent unauthorized users from gaining access to the network . IDSs detect compromised machines in the network .IPSec secures the communication channel between two authorized machines , and is frequently used byVPN software. While these techniques are effective in reducing the number of attacks from outside the corporate network, they do not secure the Wi-Fi network against the attacks. In particular, none of these can detect rogue Wi-Fi devices and DoS attacks on Wi-Fi networks. The use of VPNs and IPSec is often not sufficient, as we discussed earlier. IDS products usually detect compromised machines once the attack is launched, and most have a high false positive rate, which significantly reduces their usefulness from the perspective of a network administrator. In comparison, the DAIR security management system detects andlocates rogue Wi-Fi devices and various DoS attacks with few false positives and minimal human intervention.There are several commercial products in the area of corporate Wi-Fi security . Most use one of two approaches:they either rely on APs or they use dedicated and expensive custom hardware sensors for RF monitoring. The marketing literature of these products contains few technical details. Some commercial products rely on APs for monitoring wireless networks . Although cost effective, this approach has several limitations. First, a single-radio AP can not easily monitor multiple channels since its primary function requires it to spend most of its time on one specific channel serving associated clients. Second, the APs usually have limited CPU power and memory resources, so polling them (i.e., issuing SNMP queries) too frequently is problematic. Third, an AP only provides a view of one end of the wireless communication, so an AP-based solution can not be used to detect problems such as RF holes or excessive interference that primarily affect the client end of the communication. Finally, , monitoring the network from an AP alone does not provide comprehensive coverage. To overcome these limitations, some vendors augment the AP-based monitoring by deploying special sensor nodes throughout the organization . However, such specialized sensors are expensive, and require careful planning for an effective deployment. We are aware of only one prior research paper on detecting rogue devices . In this, mobile clients and APs monitor the network and detect rogue devices. Cisco’s Wireless LAN Solution Engine uses a similar approach . The proposed scheme has a few limitations. First, it is difficult to guarantee complete coverage because the monitoring sensors are mobile. Second, the amount of RF monitoring and reporting depends on the battery of the mobile clients. Third, the algorithm proposed in Adya et al. flags any unknown AP as a rogue device, even if the AP is not plugged into the corporate network. Fourth, the proposed techniques do not detect rogue ad hoc networks, and finally, the previous work does not detect DoS attacks on Wi-Fi networks.There is some prior research on detecting greedy and malicious behavior in IEEE 802.11 networks. Bellardo et al. presenta study of
  • 5. Securing Wi-fi Network Via... 5 various DoS attacks in IEEE 802.11 networks. Theydemonstrate the attacks, and present simple schemes to counter them. The solution requires clients to cooperate with each other and in some cases, changes to IEEE 802.11. DAIR, on the other hand, detects these faults and reports them to the network administrator. The detection framework for DAIR is more efficient due to the presence of a larger number of sensors.DOMINO is an AP based solution for detecting greedy behavior in IEEE 802.11 hotspots . Several other researchers have proposed monitoring and characterization of wireless networks by polling the Aps.These systems have the same drawbacks as other AP based solutions discussed earlier. The benefits of dense sensor deployments were presented in Conner et al. The focus of that paper was on environmental monitoring applications such as temperature control or locating empty meeting rooms, and not Wi-Fi monitoring. IV. CONCLUSION WI-FI networks are growing day by day. The new challenges or we can say the security risks are also increases day to day.We can impove the performance as well as the security with the help of proxy server ,if it is implemented successfully.we can secure the WI-Fi network upto 5-10% with the help of the proxy server. REFERENCES [1] http://www.webopedia.com/TERM/W/Wi_Fi.html [2] http://en.wikipedia.org/wiki/Proxy_server. [3] Forward and Reverse Proxies". httpd mod_proxy. Apache. Retrieved 20 December 2010. [4] Lyon, Gordon (2008). Nmap network scanning. US: Insecure. p. 270.ISBN 978-0-9799587-1-7. [5] Wireless lan security today and tomorrow by Sangram Goyal and Dr. S. A. Vetha Manickam Center for Information and Network Security Pune University. [6] Wireless security ppt by David Wagner. [7] The State of Wi-Fi® Security Wi-Fi CERTIFIED™ WPA2TM Delivers Advanced Security to Homes, Enterprises and Mobile Devices by Wi-Fi Alliance. [8] Introduction to Wi-Fi Network Security By Bradley Mitchell . [9] Sara Nasre Wireless Lan Security Research Paper IT 6823 Information Security Instructor: Dr. Andy Ju An Wang Spring 2004. [10] WI-FI security –WEP, WPA and WPA2 by Guillaume Lehembre.