VULNERABILITEIES &THREATS OF WIRELESS COMMUNICATION

WLAN VULNERABILITIES

 The easy installation and use of an AP

This vulnerability allows any individual to introduce an unauthorized wireless network in unauthorized areas.

 The AP configuration

If the AP is poorly configured or unauthorized, then it can provide an open door to attackers.

 Physical security of an authorized AP.

An AP has to be correctly placed and physically protected in order to avoid accidental damage

 Signal range of an authorized AP.

the AP’s placement and the signal strength have to be closely studied to make sure that the transmitting coverage of the AP is just enough to cover the required area and does not extend out of this area.

 Rogue AP.

allows an attacker to place an unauthorized (or rogue) AP on the network area and configure it to look legitimate to the network users to gain access to a wireless user’s sensitive data.

 Protocol weaknesses and capacity limits on authorized APs

These vulnerabilities can cause Denial of Service attacks (DoS) from malicious users utilizing unauthorized APs when they can flood authorized AP with traffic forcing them to reboot or deny accesses.

Cellular System Vulnerabilities

 Service interruption vulnerabilities:

decreased the number of switches and enhanced their capacities, and increased the vulnerability of telecommunication infrastructures.

 Handset vulnerabilities:

 Radio link protection-only vulnerability:

implementation of security mechanisms can present some weaknesses allowing attackers to launch successful attacks.

anyone may attempt to access the network at this moment and get the message during transformation.


Particular threats of the wireless communication are :

i. device theft

ii. malicious hacker

iii. malicious code

iv. and theft of service

Threats

Application-Based Threats

posed by executable malicious codes that are inserted into existing or new wireless applications.

pretended to convert the shareware specific game program into a registered version.

Content-Based Threats

sending infected email messages from affected computers.

ability of a malicious code to hit the wireless infrastructure and spread with a considerable speed.

Mixed Application Threats

can cause damage to any mobile station it visits, and spreads across very large areas over a limited period of time.