Tuesday, May 5, 2020

Secure Data Aggregation Technique Networks - MyAssignmenthelp.com

Question: Discuss about the Secure Data Aggregation Technique Networks. Answer: Introduction Wireless networking can be beneficial in increasing the productivity of any organization or easy connectivity between the devices. Because it is much easy to setup within the premises and at low cost expenditure it is being listed into the trending technology. This provides many advantages but also results in certain threats and issues that can alter the existing information and could raise security and privacy of the individuals connected to the network. These threats have been described in the following report include the countermeasures that could be helpful in mitigating them at extent level. The purpose of this report is to provide a basic understanding on the wireless networking concept and threats related to the application of this technology including the countermeasures. Accidental association could lead to the unauthorized access to an organization management or an individual network, which occurs due to the overlapping network of neighbors wireless access point. When an individual turns on his or her computer and accidently it latches to the wireless access point from the overlapping network of the neighbor and this accident is untraced by the user that it has occurred (Kavianpour Anderson, 2017). However this is a term of security breach to the neighbor network in that proprietary information of the individual or the organization is being exposed and could create a link to the computers connected to that network. It can be referred to the moment when wireless devices are actively made by the intruder in manner to be connected to that organization ions network through their personal laptop or other computer rather being connected to the company AP (Access Point).these computers or laptops are defined as soft Aps that are created when certain coding has been used to make the intruders network card look alike the legitimate access point (Pathan, 2016). Various malicious activities can be done after gaining the access such as intruder can steal the password, plant Trojans and/or launch attack on wired network. It can be regarded as the security risk as non-traditional networks like Bluetooth devices management are not the safe devices for cracking. Barcode readers, wireless printers, copiers, and handled PDAs are vulnerable to such attacks and should be secured as these can be overlooked by any IT team or individual those have not focused on access points and on computers much broadly (Hoque et al., 2014). Denial of Service It can be represented as DOS that can be occurred when an intruder tries to continuously bombard an AP that has been targeted or networks that have premature successful connection messages, bogus reports, or other commands including failure messages (Yan et al., 2016). These attempts could lead in crashing the network and even the legitimate user is not able to get on the network. Such attacks are completely relied on the abuse of protocols for example EAP (Extensive Authentication Protocol). Such type of attack occurred when an intruder uses the non-filtered network traffic access points, mainly the broadcasting network traffic for example OSPF, HSRP, RIP, and the spanning tree (802.1D). For affecting the routers, intelligent hubs, and the switches, an intruder uses the process of injecting bogus networking re-configuration commands (Rezwani et al., 2015). Such type of attack are capable of bringing the whole system down and there will be requirement of reprogramming for all the intelligent networking devices or may requires rebooting the system. Many of the wireless systems allow few kinds of MAC filtering in manner to allow the authorized computers with the specific MAC IDs for gaining the access and utilizing the network. MAC Spoofing can be occurred when an intruder gets access to listen in on network traffic and gets the ability to identify the MAC address of the laptops or computer with that network privileges (Gupta Jha, 2015). There are a number of coding and program that can be used for network sniffing capabilities and combining these coding with the software can be helpful in allowing the computer to pretend that it has MAC address as per the desire of the intruder and the intruders could easily made to getting into that hurdle. Countermeasures to the Raised Issues Poorly configured or insecure access points can lead towards compromising the confidentiality through providing unauthorized access to the network. There are various counter measures that could be taken for such threats and issues in the application of wireless networks that can be listed as: Securing wireless Access Points include three steps that could help in countering the threats stated above: Firstly, elimination of the rogue access points through using 802.1x on the wired network in manner to authenticate the devices or the computers that have been plugged in the same network. Second step can be sated as securely configuring the Authorized Access Points management that can be accomplished through changing all the settings that are default and well known to general persons or any IT personnel (DiPietro et al., 2014). Third step is through using 802.1x to authenticate all devices that can be helpful in preventing the unauthorized devices and rogue access points from becoming an insecure window for the intruders. Loss or theft and data compromise are the two major threats to the wireless client devices. Loss or thefts is related to the loss or theft of the PDAs and laptops that can be a concerning fact as in general these contains proprietary and confidential information. So there should be proper care and physical security should be maintained in manner to keep these information and devices secured and safe from getting into wrong hands (Wright Cache, 2015). Such carelessness could lead to the unauthorized access and sensitive data can be manipulated or compromised. Securing Wireless Networks There are various countermeasures for preventing the raised threats and issues that can be listed as: Use of encryption: encrypting or scrambling the communication over the network can help in better security for these networks and there should be proper built-in encryption mechanism into the access points, wireless routers, and base stations (Mukherjee et al., 2014). Use of Anti-spyware and anti-virus software, and firewall: Same protection is needed in this network as that of the internet connection and this software and firewall should be original and up-to date with the latest versions through keeping auto-update option on. Turn off identifier broadcasting: It is a mechanism in a router that enables it to send out a signal specifying its presence in the vicinity. There is no need for this broadcast as all the users would already know its presence. This broadcast can be used by the intruders to gain unauthorized access. Changing the router on the router from default: There is a default ID assigned by the manufacturer of the router that should be changed because even after turning identifier off intruders can get the access to the network through these default IDs (Chelli, 2015). Changing pre-administrator and pre-set passwords of the router: Everything that is being provided by the manufacturers has default credentials and those data is enough for a programmer to get into the network and gain unauthorized access. This should be changed from default to personal credentials. Allowing access to only specific computers: External computers should not be allowed to be connected to the network as it could lead to several threats as mentioned above. This could be achieved by incorporating MAC filtering on for the routers. Turning off the wireless network while not using it: The intrusion cannot be made if the router has no power so it is better to keep it off when the individuals are not around. Training and Educating Users Users are one of the basic components of wireless networking and also for its security and can be regarded as the key component for the security of wireless networking. Indeed the training for the users is an important aspect regarding the security of wireless network and educating them about the secure wireless behavior can eliminate many threats and it should be introduced in a repeated manner to the users (Dhingra Verma, 2015). It is an important part of the WLAN security policy that states that there should be regular audit to the wireless network for the rogue hardware. Mapping and scanning for all the WLAN Nodes and access points are the major activities for this section. Wavelan-tool and netstumbler are the common available mapping tools that can be used to enhance the security of wireless networks (Shu Krunz, 2015). Conclusion: Based on the above report it can be concluded that networking technology can be helpful in increasing the productivity of the organization within the budget but it also alters the risk related to the information security profile. It can be stated that completely elimination of these threats or risks is not possible whereas, proper and effective countermeasures can be taken to prevent such unwanted situations through systematic approach for assessing and managing these risks. This report discusses how and what countermeasures could be taken to minimize these threats at the level of extent and how training and auditing are the most important aspect for assessing these risks. References: Chelli, K. (2015, July). Security issues in wireless sensor networks: attacks and countermeasures. In Proceedings of the World Congress on Engineering (Vol. 1, pp. 1-3). Dhingra, K., Verma, A. (2015). Legislation Vulnerabilities, Threats and Counter Measures in Wireless Network Security. IITM Journal of Management and IT, 6(1), 135-139. Di Pietro, R., Guarino, S., Verde, N. V., Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networksa survey. Computer Communications, 51, 1-20. Gupta, A., Jha, R. K. (2015, May). Security threats of wireless networks: A survey. In Computing, communication automation (ICCCA), 2015 international conference on (pp. 389-395). IEEE. Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., Kalita, J. K. (2014). Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications, 40, 307-324. Kavianpour, A., Anderson, M. C. (2017, June). An Overview of Wireless Network Security. In Cyber Security and Cloud Computing (CSCloud), 2017 IEEE 4th International Conference on (pp. 306-309). IEEE. Mukherjee, A., Fakoorian, S. A. A., Huang, J., Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys Tutorials, 16(3), 1550-1573. Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press. Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98-110. Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98-110. Shu, T., Krunz, M. (2015). Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks. IEEE Transactions on mobile computing, 14(4), 813-828. Wright, J., Cache, J. (2015). Hacking exposed wireless: wireless security secrets solutions. McGraw-Hill Education Group. Yan, Q., Yu, F. R., Gong, Q., Li, J. (2016). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys Tutorials, 18(1), 602-622.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.