Access control and availability aspects using wireless solutions based on IEEE 802.11 technologies, providing access to classified networks
Abstract
Wireless networking is among the fastest growing trends in technology. For military
objectives wireless networks are effective and flexible ways of communicating, and important
elements in operating quick, accurate and independent. Over the last year’s commercial
technology, based on the wireless IEEE 802.11 standard has grown to be low-cost products
offering cheap and easy ways to establish rapid communication services. For all that, lacking
elements of security, increased availability, weak mechanisms and capabilities in order to
protect and safeguard private wireless networking, concerns costumers which require high
assurance communication facilities. To comply with physical security, high-end wireless
security requirements and protection mechanisms are required to fully ensure the wireless
environment and control the enterprise. Wireless networks has not been considered secure
enough to be implemented as part of high assurance communication systems which have
access to classified information networks. This thesis considers security aspects of wireless
networking related to access control and availability, which means that a wide range of
security issues will be discussed. Based on availability, the thesis will focus on requirements
and mechanisms related to authentication, confidentiality, integrity and authenticity.
The thesis has indicated through two problem scenarios that high-end requirements signifies
complexity and that security mechanisms must be implemented through adoption and
adjustment of the available security protocols IEEE 802.1X and IEEE 802.11i. Still, the thesis
has shown that security protocols such as IEEE 802.1X and 802.11i does not solve all security
problems. Additional wireless protection systems are required to supervise and control state
security in order to protect the wireless network environment. In addition, network-layer
security is required to oblige end-to-end security control. The conclusion brings security in
wireless network into comprehensive challenges that require fully control to analyze data and
operations to consolidate the wireless environment.
Considering wireless protection systems which operate as integrated parts of high assurance
wireless system, the thesis has investigated mechanisms and ways to actively protect the
wireless network environment. The thesis has shown that wireless monitor and honeypot
networks introduce potential solutions to meet availability aspects in turns of automatic
detection, protection and prevention