enhanced data security for wireless networks

Post on 03-Apr-2015

33 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1

2

Enhanced Data Security in Wireless Networks

ByAbhay Kumar Sah

(07J11A0403)Department of Electronics & Communication

Engineering (IV)

3

Abstract

Wireless Wide Area Networks (WAN) are a popular method of wirelessly accessing data over the Internet. A major concern of many corporate users of Wireless WAN is data security and how to protect data that is transmitted over these wireless networks.

Discussion on

Cellular Digital Packet Data (CDPD)

Code Division Multiple Access (CDMA)

General Packet Radio Service (GPRS)

Virtual Private Networks (VPN)

4

Cellular Digital Packet Data (CDPD)

Cellular Digital Packet Data (CDPD) is a technique used for transmitting small chunks of data, commonly referred to as packets, over the cellular network in a reliable manner.

CDPD Technology provide High Speed (19,2Kbps) High Capacity Cost Effective Data Services to mobile users Voice and Data can be transmitted

CDPD is a secure, proven and reliable protocol that has been used for law enforcement, public safety and mobile professionals to securely access critical, private information

5

Operation of CDPD

CDPD Network Structure

6

Features of CDPD

Subscriber Equipment Security

Authentication

Air Link Encryption

Network Security

Private Networks

7

Applications

Transaction Application Communication between Two users Credit Card Verification Delivery and Tracking Electronic Mail Notification, etc…….

Broadcast Application File Transfer & Statistical Information Transfer General Information Service

(National/State/International News) Weather and Traffic Advisories Advertising and Private Bulletin Boards, etc……

8

Code Division Multiple Access (CDMA)

This Technique was used to secure communications for the U.S. government (in Military) during the Cuban Missile Crisis.

Spread-spectrum technology works by taking the conversations or data and attaching a code (known only to the sender and receiver) to it.

The coded information is then split into packets and transmitted along with multiple other conversations or data packets over the network. The receiver then reassembles and decodes the data.

This result in extremely secure transmissions, because the coded information is spread over the same bandwidth, resulting in trillions of possible combinations of coded messages.

9

Operation

10

Operation

11

Features of CDMA

Lock Codes

ESN and MIN Numbers

A – Keys

Authentication

Authentication Challenge

Voice Privacy

Signaling Message Encryption

12

Smart Card Technology

A recent development is that CDMA technology now allows for the use of smart cards i.e. R-UIM (Removable User Identity Module) on CDMA-based networks.

Advantages of an R-UIM include: Easier replacement and exchange of handsets of mobile devices The Ability to move user profiles and personal data between devices Secure network connection Potential for cross-standard roaming capabilities

CDMA Applications It is used in may military applications such as Ranging, Secure

Communication, etc…….

13

General Packet Radio Service (GPRS)

GPRS (General Packet Radio Service), the most widely used global wireless technology, offers high speed data services in GSM network.

It uses Packet Mode Technique to transfer data and provides connectivity to Internet.

Using GPRS you can download in your mobile the following: Polyphonic ring tones, MP3 tones, Color logos, Wallpapers, Videos, Animations, Games, E-mails and more.

Moreover, GPRS enables the users to send and receive MMS (Multimedia Messages).

14

Operation of GPRS

GPRS Network Structure

15

Features of GPRS

Subscriber Security

Authentication

Encryption

Network Security

Additional Encryption

Private APN

16

Applications

Textural and Visual Information

Still and Moving Images

Web Browsing

Document Sharing

Audio

Job Dispatch

Corporate and Internet Email

File Transfer, etc…..

17

Virtual Private Networks (VPN)

A Virtual Private Network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network.

It aims to avoid an expensive system of owned or leased lines that can be used by only one organization.

For customers wanting additional security, an end-to-end VPN connection provides the best security.

18

Virtual Private Networks (VPN)

Connection without VPN

19

Virtual Private Networks (VPN)

Connection with VPN

20

Virtual Private Networks (VPN)

VPN Vendors Checkpoint Cisco Nortel Intel Microsoft, etc….

A VPN is able to offer secure access to data and provides different levels of security that include tunneling, encryption, authentication, and authorization.

VPNs allow remote users seamless, low-cost access to corporate networks, all over a secure connection.

21

Conclusion

WANs provide user Authentication and Data

Security and these are intended to provide data

protection within the carrier’s network but do not

extend to the Internet and beyond.

When a VPN is used with these networks, it provides

end-to-end security for all data sent over the Internet.

22

References

1. www.sirreawireless.com 2. www.bitpipe.com 3. www.itpapers.com 4. www.google.com 5. “Mobile communication” by Schilfer 6. http://www.emory.edu/BUSINESS/et/cdpd/7. http://www.cdpd.org/8. http://www.datalife.gtem.com/9. http://www.pcsi.com/10. http://www.uplanet.com/11. http://www.bee.net/mhendry/vrml/library/cdma/cdma.htm12. Viterbi, A. CDMA: Principles of Spread Spectrum Communication Addison-Wesley

Wireless Communications Series, 199513. Pickholtz, R. L., Schilling, D. L., and Milstein, L. B. “Theory of Spread-Spectrum

Communications—A Tutorial” IEEE Trans. Commun., vol. COM30, no. 5, May 1982, pp 855-884.

14. Pickholtz, R. L., Schilling, D. L., and Milstein, L. B. Revisions to “Theory of Spread-Spectrum Communications—A Tutorial” IEEE Trans. Commun., vol. COM32, no. 2, Feb 1984, pp 211-212.

15. http://www.bsnl.co.in/service/mobile_gprswap.htm16. http://www.o2.co.uk/assets/O2HybridNav/Static-files/PDFs/GPRsHowAllWorks.pdf17. http://www.m-indya.com/gprs/applications.htm18. http://en.wikipedia.org/wiki/Virtual_private_network

23

Thanks For Your Attention !!!!

top related