+ All Categories
Home > Documents > Enhanced Data Security for Wireless Networks

Enhanced Data Security for Wireless Networks

Date post: 03-Apr-2015
Category:
Upload: abhay-kumar
View: 30 times
Download: 1 times
Share this document with a friend
23
1
Transcript
Page 1: Enhanced Data Security for Wireless Networks

1

Page 2: Enhanced Data Security for Wireless Networks

2

Enhanced Data Security in Wireless Networks

ByAbhay Kumar Sah

(07J11A0403)Department of Electronics & Communication

Engineering (IV)

Page 3: Enhanced Data Security for Wireless Networks

3

Abstract

Wireless Wide Area Networks (WAN) are a popular method of wirelessly accessing data over the Internet. A major concern of many corporate users of Wireless WAN is data security and how to protect data that is transmitted over these wireless networks.

Discussion on

Cellular Digital Packet Data (CDPD)

Code Division Multiple Access (CDMA)

General Packet Radio Service (GPRS)

Virtual Private Networks (VPN)

Page 4: Enhanced Data Security for Wireless Networks

4

Cellular Digital Packet Data (CDPD)

Cellular Digital Packet Data (CDPD) is a technique used for transmitting small chunks of data, commonly referred to as packets, over the cellular network in a reliable manner.

CDPD Technology provide High Speed (19,2Kbps) High Capacity Cost Effective Data Services to mobile users Voice and Data can be transmitted

CDPD is a secure, proven and reliable protocol that has been used for law enforcement, public safety and mobile professionals to securely access critical, private information

Page 5: Enhanced Data Security for Wireless Networks

5

Operation of CDPD

CDPD Network Structure

Page 6: Enhanced Data Security for Wireless Networks

6

Features of CDPD

Subscriber Equipment Security

Authentication

Air Link Encryption

Network Security

Private Networks

Page 7: Enhanced Data Security for Wireless Networks

7

Applications

Transaction Application Communication between Two users Credit Card Verification Delivery and Tracking Electronic Mail Notification, etc…….

Broadcast Application File Transfer & Statistical Information Transfer General Information Service

(National/State/International News) Weather and Traffic Advisories Advertising and Private Bulletin Boards, etc……

Page 8: Enhanced Data Security for Wireless Networks

8

Code Division Multiple Access (CDMA)

This Technique was used to secure communications for the U.S. government (in Military) during the Cuban Missile Crisis.

Spread-spectrum technology works by taking the conversations or data and attaching a code (known only to the sender and receiver) to it.

The coded information is then split into packets and transmitted along with multiple other conversations or data packets over the network. The receiver then reassembles and decodes the data.

This result in extremely secure transmissions, because the coded information is spread over the same bandwidth, resulting in trillions of possible combinations of coded messages.

Page 9: Enhanced Data Security for Wireless Networks

9

Operation

Page 10: Enhanced Data Security for Wireless Networks

10

Operation

Page 11: Enhanced Data Security for Wireless Networks

11

Features of CDMA

Lock Codes

ESN and MIN Numbers

A – Keys

Authentication

Authentication Challenge

Voice Privacy

Signaling Message Encryption

Page 12: Enhanced Data Security for Wireless Networks

12

Smart Card Technology

A recent development is that CDMA technology now allows for the use of smart cards i.e. R-UIM (Removable User Identity Module) on CDMA-based networks.

Advantages of an R-UIM include: Easier replacement and exchange of handsets of mobile devices The Ability to move user profiles and personal data between devices Secure network connection Potential for cross-standard roaming capabilities

CDMA Applications It is used in may military applications such as Ranging, Secure

Communication, etc…….

Page 13: Enhanced Data Security for Wireless Networks

13

General Packet Radio Service (GPRS)

GPRS (General Packet Radio Service), the most widely used global wireless technology, offers high speed data services in GSM network.

It uses Packet Mode Technique to transfer data and provides connectivity to Internet.

Using GPRS you can download in your mobile the following: Polyphonic ring tones, MP3 tones, Color logos, Wallpapers, Videos, Animations, Games, E-mails and more.

Moreover, GPRS enables the users to send and receive MMS (Multimedia Messages).

Page 14: Enhanced Data Security for Wireless Networks

14

Operation of GPRS

GPRS Network Structure

Page 15: Enhanced Data Security for Wireless Networks

15

Features of GPRS

Subscriber Security

Authentication

Encryption

Network Security

Additional Encryption

Private APN

Page 16: Enhanced Data Security for Wireless Networks

16

Applications

Textural and Visual Information

Still and Moving Images

Web Browsing

Document Sharing

Audio

Job Dispatch

Corporate and Internet Email

File Transfer, etc…..

Page 17: Enhanced Data Security for Wireless Networks

17

Virtual Private Networks (VPN)

A Virtual Private Network (VPN) is a computer network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network.

It aims to avoid an expensive system of owned or leased lines that can be used by only one organization.

For customers wanting additional security, an end-to-end VPN connection provides the best security.

Page 18: Enhanced Data Security for Wireless Networks

18

Virtual Private Networks (VPN)

Connection without VPN

Page 19: Enhanced Data Security for Wireless Networks

19

Virtual Private Networks (VPN)

Connection with VPN

Page 20: Enhanced Data Security for Wireless Networks

20

Virtual Private Networks (VPN)

VPN Vendors Checkpoint Cisco Nortel Intel Microsoft, etc….

A VPN is able to offer secure access to data and provides different levels of security that include tunneling, encryption, authentication, and authorization.

VPNs allow remote users seamless, low-cost access to corporate networks, all over a secure connection.

Page 21: Enhanced Data Security for Wireless Networks

21

Conclusion

WANs provide user Authentication and Data

Security and these are intended to provide data

protection within the carrier’s network but do not

extend to the Internet and beyond.

When a VPN is used with these networks, it provides

end-to-end security for all data sent over the Internet.

Page 22: Enhanced Data Security for Wireless Networks

22

References

1. www.sirreawireless.com 2. www.bitpipe.com 3. www.itpapers.com 4. www.google.com 5. “Mobile communication” by Schilfer 6. http://www.emory.edu/BUSINESS/et/cdpd/7. http://www.cdpd.org/8. http://www.datalife.gtem.com/9. http://www.pcsi.com/10. http://www.uplanet.com/11. http://www.bee.net/mhendry/vrml/library/cdma/cdma.htm12. Viterbi, A. CDMA: Principles of Spread Spectrum Communication Addison-Wesley

Wireless Communications Series, 199513. Pickholtz, R. L., Schilling, D. L., and Milstein, L. B. “Theory of Spread-Spectrum

Communications—A Tutorial” IEEE Trans. Commun., vol. COM30, no. 5, May 1982, pp 855-884.

14. Pickholtz, R. L., Schilling, D. L., and Milstein, L. B. Revisions to “Theory of Spread-Spectrum Communications—A Tutorial” IEEE Trans. Commun., vol. COM32, no. 2, Feb 1984, pp 211-212.

15. http://www.bsnl.co.in/service/mobile_gprswap.htm16. http://www.o2.co.uk/assets/O2HybridNav/Static-files/PDFs/GPRsHowAllWorks.pdf17. http://www.m-indya.com/gprs/applications.htm18. http://en.wikipedia.org/wiki/Virtual_private_network

Page 23: Enhanced Data Security for Wireless Networks

23

Thanks For Your Attention !!!!


Recommended