Date post: | 03-Apr-2015 |
Category: |
Documents |
Upload: | abhay-kumar |
View: | 30 times |
Download: | 1 times |
1
2
Enhanced Data Security in Wireless Networks
ByAbhay Kumar Sah
(07J11A0403)Department of Electronics & Communication
Engineering (IV)
3
Abstract
Wireless Wide Area Networks (WAN) are a popular method of wirelessly accessing data over the Internet. A major concern of many corporate users of Wireless WAN is data security and how to protect data that is transmitted over these wireless networks.
Discussion on
Cellular Digital Packet Data (CDPD)
Code Division Multiple Access (CDMA)
General Packet Radio Service (GPRS)
Virtual Private Networks (VPN)
4
Cellular Digital Packet Data (CDPD)
Cellular Digital Packet Data (CDPD) is a technique used for transmitting small chunks of data, commonly referred to as packets, over the cellular network in a reliable manner.
CDPD Technology provide High Speed (19,2Kbps) High Capacity Cost Effective Data Services to mobile users Voice and Data can be transmitted
CDPD is a secure, proven and reliable protocol that has been used for law enforcement, public safety and mobile professionals to securely access critical, private information
5
Operation of CDPD
CDPD Network Structure
6
Features of CDPD
Subscriber Equipment Security
Authentication
Air Link Encryption
Network Security
Private Networks
7
Applications
Transaction Application Communication between Two users Credit Card Verification Delivery and Tracking Electronic Mail Notification, etc…….
Broadcast Application File Transfer & Statistical Information Transfer General Information Service
(National/State/International News) Weather and Traffic Advisories Advertising and Private Bulletin Boards, etc……
8
Code Division Multiple Access (CDMA)
This Technique was used to secure communications for the U.S. government (in Military) during the Cuban Missile Crisis.
Spread-spectrum technology works by taking the conversations or data and attaching a code (known only to the sender and receiver) to it.
The coded information is then split into packets and transmitted along with multiple other conversations or data packets over the network. The receiver then reassembles and decodes the data.
This result in extremely secure transmissions, because the coded information is spread over the same bandwidth, resulting in trillions of possible combinations of coded messages.
9
Operation
10
Operation
11
Features of CDMA
Lock Codes
ESN and MIN Numbers
A – Keys
Authentication
Authentication Challenge
Voice Privacy
Signaling Message Encryption
12
Smart Card Technology
A recent development is that CDMA technology now allows for the use of smart cards i.e. R-UIM (Removable User Identity Module) on CDMA-based networks.
Advantages of an R-UIM include: Easier replacement and exchange of handsets of mobile devices The Ability to move user profiles and personal data between devices Secure network connection Potential for cross-standard roaming capabilities
CDMA Applications It is used in may military applications such as Ranging, Secure
Communication, etc…….
13
General Packet Radio Service (GPRS)
GPRS (General Packet Radio Service), the most widely used global wireless technology, offers high speed data services in GSM network.
It uses Packet Mode Technique to transfer data and provides connectivity to Internet.
Using GPRS you can download in your mobile the following: Polyphonic ring tones, MP3 tones, Color logos, Wallpapers, Videos, Animations, Games, E-mails and more.
Moreover, GPRS enables the users to send and receive MMS (Multimedia Messages).
14
Operation of GPRS
GPRS Network Structure
15
Features of GPRS
Subscriber Security
Authentication
Encryption
Network Security
Additional Encryption
Private APN
16
Applications
Textural and Visual Information
Still and Moving Images
Web Browsing
Document Sharing
Audio
Job Dispatch
Corporate and Internet Email
File Transfer, etc…..
17
Virtual Private Networks (VPN)
A Virtual Private Network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network.
It aims to avoid an expensive system of owned or leased lines that can be used by only one organization.
For customers wanting additional security, an end-to-end VPN connection provides the best security.
18
Virtual Private Networks (VPN)
Connection without VPN
19
Virtual Private Networks (VPN)
Connection with VPN
20
Virtual Private Networks (VPN)
VPN Vendors Checkpoint Cisco Nortel Intel Microsoft, etc….
A VPN is able to offer secure access to data and provides different levels of security that include tunneling, encryption, authentication, and authorization.
VPNs allow remote users seamless, low-cost access to corporate networks, all over a secure connection.
21
Conclusion
WANs provide user Authentication and Data
Security and these are intended to provide data
protection within the carrier’s network but do not
extend to the Internet and beyond.
When a VPN is used with these networks, it provides
end-to-end security for all data sent over the Internet.
22
References
1. www.sirreawireless.com 2. www.bitpipe.com 3. www.itpapers.com 4. www.google.com 5. “Mobile communication” by Schilfer 6. http://www.emory.edu/BUSINESS/et/cdpd/7. http://www.cdpd.org/8. http://www.datalife.gtem.com/9. http://www.pcsi.com/10. http://www.uplanet.com/11. http://www.bee.net/mhendry/vrml/library/cdma/cdma.htm12. Viterbi, A. CDMA: Principles of Spread Spectrum Communication Addison-Wesley
Wireless Communications Series, 199513. Pickholtz, R. L., Schilling, D. L., and Milstein, L. B. “Theory of Spread-Spectrum
Communications—A Tutorial” IEEE Trans. Commun., vol. COM30, no. 5, May 1982, pp 855-884.
14. Pickholtz, R. L., Schilling, D. L., and Milstein, L. B. Revisions to “Theory of Spread-Spectrum Communications—A Tutorial” IEEE Trans. Commun., vol. COM32, no. 2, Feb 1984, pp 211-212.
15. http://www.bsnl.co.in/service/mobile_gprswap.htm16. http://www.o2.co.uk/assets/O2HybridNav/Static-files/PDFs/GPRsHowAllWorks.pdf17. http://www.m-indya.com/gprs/applications.htm18. http://en.wikipedia.org/wiki/Virtual_private_network
23
Thanks For Your Attention !!!!