Ask Computer Network & Security Expert

QUESTION 1

Think about a number of wireless devices (nodes) which are connected to the Internet via a single access point (AP).

2240_WIRELESS NETWORK SECURITY.png

 

a. Provide three reasons why security is more of a concern in this type of wireless network?

(b) Catalogue the three main goals of information security.

(c) Elucidate how CSMA/CA is used with Wireless LANs.

(d) Give details for the differences between war driving and war flying.

(e) Which two forms have favoured adoption of 802.11g over 802.11a?

(f) Portray the diverse steps adopted by an attacker during wireless hacking process.

QUESTION 2

The 802.11 security architecture and protocolis k/n as Wired Equivalent Privacy (WEP) and it is accountable for providing authentication, confidentiality and data integrity in 802.11 networks.

(a) Briefly, describe the differences the flanked by Open System Authentication and Shared Key Authentication, as used in WEP. Which one is more secure?

(b) The absence of any key establishment protocol in WEP led to multiple problems. File any three problems.

(c) Describe the purpose of using beacons while connecting to wireless LANs.

(d) What are the two WEP key lengths?

(e) Elucidate what is meant by the term Initialisation Vector (IV).

(f) WEP has been known to have various security vulnerabilities, leading to its failure.

i. Illustrate any three vulnerabilities of using WEP.

ii. Briefly explicate how FMS attack can be performed and give any one common tool used by attackers.

iii. Though, even today WEP encryption is still used in some networks. Explain how to best make use of WEP in such networks.

QUESTION 3

(a) Provide one reason why WPA2 encryption is preferred over WEP?

(b) By using an appropriate drawing, describe how the 802.1x authentication model is mapped to Wi-Fi.

(c) What do the subsequent acronyms stand for?

i. RADIUS

ii. EAPOL

(d) Give two prominent features of using AES in counter mode for WPA2.

(e) One of the main causes in using EAP is the ability to leverage multiple types of authentication mechanisms. Point out any two such authentication mechanisms.

(f) Regard (notice) the following a list of loopholes found in WEP. Explain how WPA fix each of these loopholes:

i. No protection against replay attacks.

ii. No support for a station to validate a network.

iii. Revealing the master key to attacks like FMS (due to generation of per-packet key)

QUESTION 4

Radio Frequency Identification (RFID) is about devices and technology that use radio signals to swap over the identifying data.

(a) Present two typical uses of RFID systems.

(b) Describe the difference between active and passive tags.

(c) Describe how complacency can cause serious security problems to businesses adopting RFID technology.

(d) Portray two common techniques that fraudsters can adopt in order to temporarily disable RFID tags.

(e) Briefly depict any two types of radio frequency manipulation attacks.

(f) Briefly put in plain words on the following attacks to RFID systems:

i. Relay attack

ii. Side channel attack

(f) Unauthorized tag reading has often been a security challenge for RFID systems. illustrate two mechanisms that can be adopted to enforce confidentiality during transmission of RFID components.

QUESTION 5

(a) Regard (notice) the branch of a Wireless Mesh Network (WMN) where a mobile station MS is within the transmission range of TAP3 and relies on it to get Internet connectivity.

i. Describe the function of a TAP.

ii. Give two benefits of adopting WMNs.

iii. Why is the security of multi-hop routing vital in WMNs

iv. Explain any one technique that an adversary can use to attack the routing mechanism in this scenario.

v. Give two causes why WMNs are not ready for wide-scale deployment.

(b) Vehicular Communications (VC), which is still a research area, is expected to play a central role in the effort to create safer and more efficient driving states after a few decades.

i. Briefly, explain three security vulnerabilities of VC.

ii. Why is privacy an issue in vehicular networks, considering that today's vehicles have license plates?

iii. Network volatility is one of the most significant operational challenges to vehicular communications, thus making security a hard problem. Argue.

(c) Briefly elucidate how the denial of services attacks is performed on mobile nodes by attackers. Also, describe how Mobile IP prevents such denial of service attacks.

QUESTION 6

An overall rise in mobility, coupled with the falling cost of Wi-Fi tools (rigging), has led to a proliferation of Wi-Fi hot spots in public areas, such as coffee shops and airports, to provide Internet accessibility. Though, this proliferation has also engendered growing security concerns.

(a) By the use of a drawing, describe the typical architecture for Wi-Fi hotspots.

(b) List three security vulnerabilities of the controller in Wi-Fi hotspots.

(c) In terms of Wi-Fi hotspot security, explain what a service theft attack is.

(d) Discriminate between active session hijacking and passive session hijacking.

(e) Converse on the defensive security mechanisms that can be employed in order to better secure public Wi-Fi hotspots.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9718985

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As