Network Security & Cryptography: IEEE Wireless Networks

Network Security & Cryptography: IEEE Wireless Networks

So as we have seen in previous blog what is Network security & Cryptography and all the general concepts related to it. Moving further in this blog we will see some terminology and concepts further.

The IEEE (Institute of Electrical and Electronics Engineers) wireless networks encompass a broad range of standards that facilitate wireless communication technologies. These standards are essential for ensuring interoperability, reliability, and efficiency in wireless networking.

The primary IEEE standards for wireless networks include WLAN (Wireless Local Area Network) under

IEEE 802.11, WPAN (Wireless Personal Area Network)

IEEE 802.15, WMAN (Wireless Metropolitan Area Network) IEEE 802.16, and WRAN (Wireless Regional Area Network)

IEEE 802.22.

Additionally, the IEEE 802.20 standard addresses mobile broadband wireless access, and IEEE 802.21 focuses on media-independent handover services.

Each of these standards serves a specific purpose and application area, ranging from short-range personal communications to largescale metropolitan and regional networking. They play a critical role in modern enabling telecommunications, devices to connect wirelessly within homes, offices, cities, and beyond. The standards ensure seamless integration and communication across various devices and networks, supporting the growing demand for wireless connectivity in an increasingly mobile world.

Network Security and Cryptography IEEE wireless standards are continuously evolving to incorporate new technologies and meet the ever-increasing requirements for speed, security, and reliability. These standards form the backbone of many wireless communication systems used today, including Wi-Fi, Bluetooth, WiMAX, and more. Understanding these standards is crucial for designing, implementing, and managing efficient and secure wireless networks.

2.2 WLAN IEEE 802.11 WLAN (Wireless Local Area Network) IEEE 802.11 is a set of standards developed by the IEEE to define wireless communication protocols for local area networking. These standards, commonly referred to as Wi-Fi, enable devices to communicate over a wireless network using radio waves. The IEEE 802.11 family of standards covers various aspects of wireless networking, including transmission methods, security, and performance, making it the foundation for most wireless networking technologies used in homes, businesses, and public spaces. WLANs are designed to provide wireless connectivity within a limited geographical area, such as a home, office, or campus. They allow multiple devices to connect to a network without the need for physical cables, enhancing mobility and flexibility. WLANs typically consist of access points (APs) that act as the central hub for wireless communication, connecting multiple devices such as laptops, smartphones, and tablets to a wired network.

IEEE Wireless Networks IEEE 802.11 Standards The IEEE 802.11 standards cover a wide range of specifications, each designed to address different aspects of wireless networking: ✨802.11a: Operates in the 5 GHz band, offering higher speeds and less interference.

✨802.11b: Operates in the 2.4 GHz band, providing wider coverage but lower speeds.

✨802.11g: Combines the best of 802.11a and 802.11b, operating in the 2.4 GHz band with higher speeds.

✨802.11n: Introduces MIMO (Multiple Input Multiple Output) technology, significantly increasing speed and range. ✨802.11ac: Operates in the 5 GHz band with even higher speeds and improved performance.

✨802.11ax (Wi-Fi 6): The latest standard, offering enhanced efficiency, speed, and capacity, particularly in high-density environments.

Architecture and Operation The architecture of WLAN IEEE 802.11 consists of several key components:

👉🏻Stations (STAs): Devices with wireless network interfaces (e.g., laptops, smartphones).

👉🏻Access Points (APs): Devices that connect wireless clients to a wired network.

👉🏻Basic Service Set (BSS): A group of stations communicating with each other.

👉🏻 Extended Service Set (ESS): Multiple BSSs interconnected by a distribution system.

Operation involves the following steps:

1. Association: Devices connect to an AP to join the network.

2. Authentication: Devices authenticate to ensure secure access.

3. Data Transmission: Devices exchange data packets via the AP.

4. Roaming: Devices move between APs without losing connectivity. Security Features Security is a critical aspect of WLAN IEEE 802.11.

Key security features include:

🔒 WEP (Wired Equivalent Privacy): An early security protocol, now considered insecure.

🔒 WPA (Wi-Fi Protected Access): An improved security protocol with stronger encryption.

🔒 WPA2: Provides even stronger security with AES (Advanced Encryption Standard) encryption.

🔒 WPA3: The latest security protocol, offering enhanced protection for both personal and enterprise networks. Additional security measures include MAC address filtering, SSID hiding, and the use of VPNs (Virtual Private Networks). Applications and Use Cases WLAN IEEE 802.11 is used in a wide range of applications and environments:

🏠 Home Networking: Connecting devices such as computers, smart TVs, and IoT devices. IEEE Wireless Networks

🏢 Office and Enterprise Networks: Enabling wireless access for employees, guests, and devices.

👉🏻Public Wi-Fi: Providing internet access in public places like cafes, airports, and libraries.

👉🏻Education: Supporting wireless connectivity in schools and universities.

👉🏻Healthcare: Facilitating wireless communication for medical devices and patient records.

👉🏻Retail: Enhancing customer experience with wireless point-of-sale systems and inventory management.

The widespread adoption of WLAN IEEE 802.11 standards has revolutionized the way we connect and interact with technology, making wireless communication an integral part of modern life.

2.3 WPAN IEEE 802.15 WPAN (Wireless Personal Area Network):-

IEEE 802.15 is a set of standards developed by the IEEE for short-range wireless communication. These standards focus on enabling devices to connect and communicate over short distances, typically within a range of a few meters. The most well-known application of WPAN standards is Bluetooth, which facilitates wireless connectivity for personal devices such as smartphones, tablets, and wearable technology. The IEEE 802.15 family of standards addresses various requirements for personal area networking, including low power consumption, low data rates, and efficient connectivity for a wide range of devices. WPANs are designed to provide wireless connectivity for devices within a close proximity, such as within a room or a personal workspace. These networks are characterized by their low power consumption and ability to support a diverse array of applications, from simple data transfer between devices to more complex tasks like sensor networks and industrial automation. WPANs enable seamless communication and interaction between personal devices without the need for cables, enhancing convenience and mobility. IEEE 802.15 Standards

The IEEE 802.15 standards encompass several specifications, each tailored to different applications and requirements:

👉🏻802.15.1: Based on Bluetooth, focusing on low power and low-cost connectivity.

👉🏻802.15.4: Designed for low-rate wireless personal area networks (LR-WPANs), providing a framework for protocols such as ZigBee, 6LoWPAN, and Thread.

👉🏻802.15.6: Targeted at body area networks (BANs), ensuring reliable communication for wearable and implantable devices.

👉🏻 802.15.7: Standard for visible light communication (VLC), using light-emitting diodes (LEDs) for data transmission. Architecture and Operation

The architecture of WPAN IEEE 802.15 consists of several components that facilitate short-range communication:

💻Devices (Nodes): Any electronic device with a wireless interface, such as smartphones, sensors, or medical devices.

💻 Personal Operating Space (POS): The area within which WPAN devices can communicate, typically a few meters in range.

🗼 Piconet: A network formed by one master device and one or more slave devices, commonly used in Bluetooth.

🗼 Cluster: A network topology used in IEEE 802.15.4, where devices communicate through a coordinator node. Operation involves the following steps:

1. Discovery: Devices search for other devices within range and establish initial communication.

2. Pairing: Devices authenticate and establish a secure connection.

3. Data Exchange: Devices transmit and receive data, either directly or through a coordinator. 4. Disconnection: Devices terminate the connection when communication is no longer needed. Security Features Security is an essential aspect of WPAN IEEE 802.15 to protect data and ensure privacy. Key security features include:

🔒Encryption: Protects data transmitted between devices using protocols like AES (Advanced Encryption Standard).  Authentication: Verifies the identity of devices to prevent unauthorized access.

📶Pairing Methods: Ensures secure device pairing through mechanisms like passkeys, numerical comparison, or out-of-band methods.

🔐Secure Key Distribution: Manages the distribution and exchange of cryptographic keys between devices. Security and Cryptography Applications and Use Cases WPAN IEEE 802.15 standards are employed in a variety of applications and scenarios: 👉🏻Consumer Electronics: Enabling wireless connectivity for headphones, keyboards, mice, and gaming controllers.

👉🏻 Wearable Technology: Supporting devices such as smartwatches, fitness trackers, and health monitors.

👉🏻 Healthcare: Facilitating communication for medical devices, such as glucose monitors and pacemakers.

👉🏻 Home Automation: Powering smart home devices, including lighting, thermostats, and security systems.

👉🏻Industrial Automation: Providing connectivity for sensors and control systems in manufacturing and production environments.

👉🏻Automotive: Enabling hands-free calling, audio streaming, and vehicle diagnostics.

The widespread adoption of WPAN IEEE 802.15 standards has greatly enhanced the connectivity and functionality of personal and consumer devices, making wireless communication an integral part of everyday life. 2.4 WMAN IEEE 802.16 WMAN (Wireless Metropolitan Area Network) IEEE 802.16, commonly known as WiMAX (Worldwide Interoperability for Microwave Access), is a set of standards developed by the IEEE for wireless broadband access over large geographical areas. These standards are designed to provide high-speed internet and telecommunications services to urban and suburban areas, covering distances up to several kilometers. WiMAX technology aims to offer an alternative to cable and DSL, providing last-mile connectivity, especially in areas where wired infrastructure is not feasible. WMANs are designed to provide wireless broadband connectivity across metropolitan areas, offering high-speed internet access to a large number of users. These networks are characterized by their ability to cover extensive areas, often spanning entire cities or regions, and providing connectivity to residential, commercial, and industrial users. WMANs use a network of base stations to deliver wireless services, enabling users to connect to the internet without the need for physical cables. IEEE 802.16 Standards

The IEEE 802.16 standards include several specifications, each addressing different aspects of wireless broadband communication:

👉🏻802.16-2004: The original standard, providing fixed broadband wireless access.  802.16e: An enhancement to the original standard, adding support for mobile broadband access and handoff between base stations.

👉🏻802.16m: Also known as WiMAX 2.0, providing advanced features such as higher data rates, improved spectral efficiency, and support for 4G services. Architecture and Operation

The architecture of WMAN IEEE 802.16 consists of several key components:

👉🏻Base Stations (BS): Central nodes that provide wireless connectivity to user devices over a large area.

👉🏻Subscriber Stations (SS): Devices used by end-users to connect to the network, such as WiMAX modems or integrated devices.

👉🏻Backhaul Network: Connects base stations to the core network, typically using high-capacity wired or wireless links.

Operation involves the following steps:

1. Connection Setup: User devices connect to the nearest base station and authenticate to gain network access.

2. Data Transmission: Data is transmitted between user devices and the internet via base stations, using orthogonal frequency-division multiple access (OFDMA) for efficient spectrum utilization.

3. Mobility Support: Mobile WiMAX supports handoff between base stations, ensuring continuous connectivity for mobile users.

4. Quality of Service (QoS): The network prioritizes different types of traffic to ensure consistent performance for various applications. Security Features Security is a critical aspect of WMAN IEEE 802.16, ensuring the protection of data and network integrity.

Key security features include:

👉🏻Encryption: Protects data transmitted over the network using protocols such as AES (Advanced Encryption Standard).

👉🏻Authentication: Verifies the identity of devices and users to prevent unauthorized access.

👉🏻Privacy Key Management (PKM): Manages the distribution and renewal of cryptographic keys used for encryption and authentication.

👉🏻Mutual Authentication: Ensures both the base station and subscriber station authenticate each other, preventing man-in-the-middle attacks.

Applications and Use Cases WMAN IEEE 802.16 standards are employed in a variety of applications and scenarios:

👉🏻Residential Broadband: Providing high-speed internet access to homes, particularly in underserved areas where wired infrastructure is lacking.

👉🏻Enterprise Connectivity: Offering reliable broadband services to businesses, enabling communication, data transfer, and cloud services.

👉🏻Public Wi-Fi: Extending internet access to public areas such as parks, campuses, and transportation hubs.

👉🏻Mobile Broadband: Supporting connectivity for mobile devices and services, including smartphones, tablets, and portable hotspots.

👉🏻Emergency Services: Enabling communication for first responders and disaster recovery operations in areas where traditional infrastructure may be compromised.

👉🏻Rural and Remote Areas: Delivering broadband services to rural and remote locations, bridging the digital divide and providing access to essential online services.

The deployment of WMAN IEEE 802.16 has significantly expanded the availability of high-speed internet access, particularly in regions where traditional wired infrastructure is not feasible, contributing to greater connectivity and digital inclusion.

2.5. WMAN Mobile IEEE 802.20 WMAN Mobile IEEE 802.20, also known as Mobile Broadband Wireless Access (MBWA), is a set of standards developed by the IEEE to provide high-speed mobile internet access across metropolitan areas. This standard aims to deliver seamless connectivity and mobility support for users on the move, ensuring reliable broadband access for a variety of mobile devices, such as smartphones, tablets, and laptops.

The IEEE 802.20 standard was designed to complement existing mobile technologies and provide an efficient solution for metropolitan wireless communication needs. WMAN Mobile IEEE 802.20 is focused on providing high-speed, mobile broadband services with a particular emphasis on supporting user mobility. Unlike fixed wireless access systems, WMAN Mobile is designed to maintain connectivity and performance as users move across different areas, ensuring continuous service. The network infrastructure enables wide coverage, typically spanning entire cities or metropolitan regions, allowing users to access the internet, stream media, and use various online services while on the go.

IEEE 802.20 Standards The IEEE 802.20 standard specifies several key features and requirements for mobile broadband wireless access:

👉🏻High Data Rates: Supports data transmission rates suitable for broadband applications, providing a user experience comparable to fixed broadband services.  Mobility: Designed to maintain connectivity and performance for users traveling at high speeds, such as in vehicles or trains.

👉🏻QoS (Quality of Service): Ensures consistent performance for different types of applications, including voice, video, and data services.

👉🏻Spectral Efficiency: Optimizes the use of available spectrum to maximize network capacity and performance.

Architecture and Operation The architecture of WMAN Mobile IEEE 802.20 includes several key components:

👉🏻Base Stations (BS): Provide wireless coverage over large areas and serve as the central points of connectivity for mobile devices.

👉🏻Mobile Stations (MS): User devices, such as smartphones and tablets, that connect to the network through base stations.

👉🏻Core Network: The backbone of the network, connecting base stations and providing access to internet services and other networks.

Operation involves the following steps:

1. Network Entry: Mobile devices connect to the nearest base station and authenticate to gain network access.

2. Mobility Management: The network tracks the movement of mobile devices and ensures seamless handoff between base stations to maintain connectivity.

3. Data Transmission: Data is transmitted between mobile devices and the internet through base stations using advanced modulation and coding techniques to optimize performance.

4. Quality of Service (QoS): The network prioritizes different types of traffic to ensure consistent performance for various applications, such as streaming, browsing, and voice calls. Security Features Security is a critical aspect of WMAN Mobile IEEE 802.20, ensuring the protection of data and network integrity.

Key security features include:

👉🏻Encryption: Protects data transmitted over the network using strong encryption protocols.

👉🏻Authentication: Verifies the identity of devices and users to prevent unauthorized access.

👉🏻Access Control: Manages permissions and access levels for different users and devices.

👉🏻Integrity Protection: Ensures that data has not been tampered with during transmission.

Applications and Use Cases WMAN Mobile IEEE 802.20 standards are employed in a variety of applications and scenarios:

👉🏻Mobile Broadband: Providing high-speed internet access to mobile users, enabling activities such as web browsing, streaming, and online gaming while on the move.

👉🏻Public Transportation: Offering reliable internet access to passengers on buses, trains, and other forms of public transport, enhancing the travel experience.

👉🏻Emergency Services: Enabling communication for first responders and disaster recovery operations, providing connectivity in critical situations where traditional infrastructure may be compromised.

👉🏻Enterprise Mobility: Supporting business applications and communication for employees working in the field, ensuring they have access to essential online resources.

👉🏻Urban Connectivity: Enhancing internet access in metropolitan areas, supporting smart city initiatives, and improving overall connectivity for residents and visitors.

The deployment of WMAN Mobile IEEE 802.20 has significantly expanded the availability of high-speed mobile internet access, ensuring that users can stay connected and productive while on the go, and contributing to the development of more connected and efficient urban environments.

2.6 MIH IEEE 802.21 Media Independent Handover (MIH) IEEE 802.21 is a set of standards developed by the IEEE to facilitate seamless handover and interoperability between different types of wireless and wired networks. The primary goal of MIH is to enable continuous connectivity and optimal network performance as users move between various network types, such as Wi-Fi, cellular, and Ethernet. This standard is essential for providing a consistent user experience in heterogeneous network environments, where multiple network technologies coexist and users frequently switch between them.

MIH IEEE 802.21 focuses on enabling smooth transitions between different network types, ensuring that users maintain uninterrupted service while moving. This standard supports vertical handovers (between different network types) and horizontal handovers (within the same network type). By providing a common framework for handover management, MIH enhances the user experience by minimizing disruptions and optimizing network performance during transitions. IEEE 802.21 Standards Overview

The IEEE 802.21 standard focuses on media-independent handover (MIH), enabling seamless transitions between various network types such as Wi-Fi, cellular, and wired networks. Key features include:

  • Media Independence: Allows for handovers across different network technologies.

  • Handover Control: Detects when a handover is needed, selects the best network, and executes the transition.

  • Information Services: Provides details about available networks and their current conditions.

  • Command Services: Facilitates communication between devices and networks during handovers.

Architecture and Operation

The MIH Function (MIHF) is the core component managing handover processes between the link layer (L2) and higher layers (L3+). The handover process involves:

  1. Initiation: Detecting the need for a handover.

  2. Network Discovery: Gathering information about available networks.

  3. Decision: Selecting the optimal network.

  4. Execution: Coordinating the handover.

  5. Post-Handover Optimization: Enhancing performance after the transition.

Security Features

Security in IEEE 802.21 includes:

  • Authentication: Verifies the identity of devices and networks.

  • Encryption: Ensures data privacy during handovers.

  • Integrity Protection: Safeguards data from tampering.

  • Access Control: Manages permissions for involved devices and networks.

Applications

IEEE 802.21 enhances seamless roaming across networks, improving experiences in:

  • VoIP, video streaming, and gaming.

  • Smart cities and enterprise mobility.

  • Public safety communications.


IEEE 802.22 Standards Overview

The IEEE 802.22 standard aims to provide wireless broadband over large rural and underserved areas using TV white spaces (unused television spectrum). Its features include:

  • TV White Spaces Utilization: Optimizes spectrum use for wide-area coverage.

  • Cognitive Radio Technology: Detects and avoids interference with existing TV services.

  • High Data Rates: Supports applications requiring significant bandwidth.

  • Quality of Service (QoS): Ensures reliable performance for different types of traffic.

Architecture and Operation

Key components of WRAN IEEE 802.22 include:

  • Base Stations (BS): Provide wide coverage, connecting to user devices.

  • Customer Premises Equipment (CPE): Devices that connect to base stations for network access.

  • Spectrum Sensing: Detects available TV channels, avoiding interference.

Security Features

Security measures include:

  • Encryption: Protects transmitted data.

  • Authentication: Prevents unauthorized access.

  • Access Control: Manages network permissions.

  • Integrity Protection: Ensures data has not been tampered with.

Applications

IEEE 802.22 is used in:

  • Rural broadband access.

  • Public safety communication.

  • Education in underserved regions.

These standards are essential for extending broadband connectivity, especially in regions lacking traditional infrastructure.