Presented by
Mr. Nileshkumar R. Jaiswar
Wireless Network Security
Introduction
Wirelesstechnologies, in thesimplest sense, enableoneor more
devicesto communicatew...
Wireless Devices
 Personal Digital Assistants(PDA)
 Smart Phones
 Laptops
WirelessStandards
 IEEE 802.11 (bandwidth up...
Wireless Security Threats
Potential threatsin wirelessnetworksaredevicetheft, denial of
service, malicioushackers, malicio...
IEEE 802.11 Architecture
Security of 802.11 Wireless LANs
Security Features of 802.11
Wireless LANs per the Standard
1. Authentication
2. Confidentiality orprivacy
Authentication
Shared-key Authentication
Privacy
Security Requirements and Threats
Passive Attack
* Eavesdropping
* Traffic analysis
Active Attack
* Masquerading
* Replay
...
1.Loss of Confidentiality
2.Loss of Integrity
3.Loss of Network Availability
4.OtherSecurity Risks
5.Risk Mitigation
Technical Countermeasures
Software Solutions
Access Point Configuration
* Updating default passwords
* Establishing prop...
Personal Firewalls
Resources on public wireless networks have a higher
risk of attack since they generally do not have the...
Encryption
Generally have only two encryption settings
available: 40-bit shared key, and 104-bit setting.
Security Assessm...
Hardware Solutions
Hardware countermeasures formitigating
WLAN risks include implementing smart
cards, VPNs, PKI, biometri...
Public Key Infrastructure (PKI)
PKI providestheframework and servicesfor thegeneration,
production, distribution, control,...
Advantages :-
Convenience
Mobility
Expandability
Cost
Disadvantages:-
Security
Range
Reliability
Speed
Conclusion
In this case study, we have reviewed wireless
network security issues in trust, management,
interoperation and ...
Reference
http://www.bwif.org/
http://ipoint-tech.com/
http://en.wikipedia.org/wiki/Wi-Fi
http://www.webopedia.com/TERM/W/...
Thank
You
Upcoming SlideShare
Loading in …5
×

Wifi

792 views

Published on

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
792
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
78
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Wifi

  1. 1. Presented by Mr. Nileshkumar R. Jaiswar
  2. 2. Wireless Network Security Introduction Wirelesstechnologies, in thesimplest sense, enableoneor more devicesto communicatewithout physical connections Wireless Networks WirelessWideAreaNetworks(WWAN), WLANs, and WirelessPersonal AreaNetworks(WPAN). WWAN includeswide coverageareatechnologiessuch as2G cellular, Cellular Digital Packet Data(CDPD), Global System for MobileCommunications(GSM). WLAN, representing wirelesslocal areanetworks, includes802.11 and several others.
  3. 3. Wireless Devices  Personal Digital Assistants(PDA)  Smart Phones  Laptops WirelessStandards  IEEE 802.11 (bandwidth up to 2 Mbps)  IEEE 802.11b (bandwidth up to 11 Mbps)  IEEE 802.11a (bandwidth up to 54 Mbps)  IEEE 802.11g (bandwidth up to 54 Mbps)  IEEE 802.11n (support dataratesof over 100 Mbps)
  4. 4. Wireless Security Threats Potential threatsin wirelessnetworksaredevicetheft, denial of service, malicioushackers, maliciouscode, theft of service, and industrial and foreign espionage. Security requirements  Authenticity  Non repudiation  Accountability
  5. 5. IEEE 802.11 Architecture
  6. 6. Security of 802.11 Wireless LANs
  7. 7. Security Features of 802.11 Wireless LANs per the Standard 1. Authentication 2. Confidentiality orprivacy
  8. 8. Authentication
  9. 9. Shared-key Authentication
  10. 10. Privacy
  11. 11. Security Requirements and Threats Passive Attack * Eavesdropping * Traffic analysis Active Attack * Masquerading * Replay * Message modification * Denial-of-service
  12. 12. 1.Loss of Confidentiality 2.Loss of Integrity 3.Loss of Network Availability 4.OtherSecurity Risks 5.Risk Mitigation
  13. 13. Technical Countermeasures Software Solutions Access Point Configuration * Updating default passwords * Establishing proper encryption settings * Controlling thereset function * Using MAC ACL functionality * Disablebroadcast SSID feature * Changing default channel. * Using DHCP.
  14. 14. Personal Firewalls Resources on public wireless networks have a higher risk of attack since they generally do not have the same degree of protection as internal resources. Personal firewalls offersome protection against certain attacks. Personal firewalls are software-based solutions that reside on a client's machine Intrusion Detection System (IDS) An intrusion detection system is an effective tool for determining whetherunauthorized users are attempting to access, have already accessed, orhave compromised the network.
  15. 15. Encryption Generally have only two encryption settings available: 40-bit shared key, and 104-bit setting. Security Assessments Security assessments, or audits, arean essential tool for checking thesecurity postureof aWLAN and for determining correctiveaction to makesureit remains secure.
  16. 16. Hardware Solutions Hardware countermeasures formitigating WLAN risks include implementing smart cards, VPNs, PKI, biometrics, and other hardware solutions. Smart Cards Smart cards may add anotherlevel of protection, although they also add another layerof complexity. Agencies can use smart cards in conjunction with username or password
  17. 17. Public Key Infrastructure (PKI) PKI providestheframework and servicesfor thegeneration, production, distribution, control, and accounting of public key certificates. It providesapplicationswith secureencryption and authentication of network. Biometrics Biometric devicesincludefingerprint/palm-print scanners, optical scanners(including retinaand irisscanners), facial recognition scanners, and voicerecognition scanners. Biometricsprovidean added layer of protection.
  18. 18. Advantages :- Convenience Mobility Expandability Cost Disadvantages:- Security Range Reliability Speed
  19. 19. Conclusion In this case study, we have reviewed wireless network security issues in trust, management, interoperation and measurement and have identified a numberof open Critical issues in management of security relationships in public access networks include 1.multi-provider authentication 2.protection of incentiveinformation and lightweight key distribution schemes 3.compromised nodedefensethrough redundancy and consistency checking and moreefficient public-key schemes.
  20. 20. Reference http://www.bwif.org/ http://ipoint-tech.com/ http://en.wikipedia.org/wiki/Wi-Fi http://www.webopedia.com/TERM/W/Wi_Fi.html
  21. 21. Thank You

×