SlideShare a Scribd company logo
1 of 26
1. Wireless Introduction
2. Wireless network modes
3. SSID
4. WEP
5. WPA
6. Advantages
7. Disadvantage
8. Conclusion
Wireless Network Security
 INTRO
A Wireless LAN Links Two or more devices using some
wireless distribution method and usually providing a
connection through an access point to the wider internet.
 IEEE 802 series standards
802.11 – wireless LANs (LAN)
802.15 – wireless personal area networks (e.g., Bluetooth)
802.16 – wireless broadband up to 155Mb
Wireless Network Security
 802.11a – 54 Mbps@5 GHz
 Not interoperable with 802.11b
 Limited distance
 Dual-mode APs require 2 chipsets, look like two APs to clients
 Cisco products: Aironet 1200
 802.11b – 11 Mbps@2.4 GHz
 Full speed up to 300 feet
 Coverage up to 1750 feet
 Cisco products: Aironet 340, 350, 1100, 1200
 802.11g – 54 Mbps@2.4 GHz
 Same range as 802.11b
 Backward-compatible with 802.11b
 Speeds slower in dual-mode
 Cisco products: Aironet 1100, 1200
Wireless Network Security
 The 802.11 wireless networks operate in two
basic modes:
1. Infrastructure mode
2. Ad-hoc mode
 Infrastructure mode:
 each wireless client connects directly to a
central device called Access Point (AP)
 No direct connection between wireless clients
 AP acts as a wireless hub that performs the
connections and handles them between wireless
clients
Wireless Network Security
 The hub handles:
 the clients’ authentication,
 Authorization
 link-level data security (access control and enabling
data traffic encryption)
 Ad-hoc mode:
 Each wireless client connects directly with each
other
 No central device managing the connections
 Rapid deployment of a temporal network where no
infrastructures exist (advantage in case of
disaster…)
 Each node must maintain its proper authentication
list
Wireless Network Security
 Identifies a particular wireless network
 A client must set the same SSID as the one in that
particular AP Point to join the network
 Without SSID, the client won’t be able to select and
join a wireless network
 Hiding SSID is not a security measure because the
wireless network in this case is not invisible
 It can be defeated by intruders by sniffing it from any
probe signal containing it.
Wireless Network Security
 The original native security mechanism for WLAN
 provide security through a 802.11 network
 Used to protect wireless communication from eavesdropping
(confidentiality)
 Prevent unauthorized access to a wireless network (access
control)
 Prevent tampering with transmitted messages
 Provide users with the equivalent level of privacy inbuilt in
wireless networks.
Wireless Network Security
1. Appends a 32-bit CRC checksum to each outgoing frame
(INTEGRITY)
2. Encrypts the frame using RC4 stream cipher = 40-bit (standard)
or 104-bit (Enhanced) message keys + a 24-bit IV random
initialization vector (CONFIDENTIALITY).
3. The Initialization Vector (IV) and default key on the station
access point are used to create a key stream
4. The key stream is then used to convert the plain text message
into the WEP encrypted frame.
Wireless Network Security
Wireless Network Security
Wireless Network Security
 Initialization Vector IV
 Dynamic 24-bit value
 Chosen randomly by the transmitter wireless network
interface
 16.7 million possible keys (224
)
 Shared Secret Key
 40 bits long (5 ASCII characters) when 64 bit key is used
 104 bits long (13 ASCII characters) when 128 bit key is
used
 
Wireless Network Security
Wireless Network Security
IV
RC4
key
IV encrypted packet
original unencrypted packet checksum
Wireless Network Security
Wireless Network Security
1. The station sends an authentication request to AP
2. AP sends challenge text to the station.
3. The station uses its configured 64-bit or 128-bit default key
to encrypt the challenge text, and it sends the latter to AP.
4. AP decrypts the encrypted text using its configured WEP key
that corresponds to the station's default key.
5. AP compares the decrypted text with the original challenge
text.
6. If the decrypted text matches the original challenge text,
then the access point and the station share the same WEP
key, and the access point authenticates the station.
7. The station connects to the network.
Wireless Network Security
Wireless Network Security
Wireless Network Security
WEP encrypted networks can be cracked in 10 minutes
Goal is to collect enough IVs to be able to crack the key
IV = Initialization Vector, plaintext appended to the key to
avoid Repetition
Injecting packets generates IVs
 New technique in 2002
 replacement of security flaws of WEP.
 Improved data encryption
 Strong user authentication
 Because of many attacks related to
static key, WPA minimize shared secret
key in accordance with the frame
transmission.
Wireless Network Security
 Data is encrypted using the RC4 stream
cipher, with a 128-bit key and a 48-bit
initialization vector (IV).
 One major improvement in WPA over WEP is
the Temporal Key Integrity Protocol (TKIP),
which dynamically changes keys as the
system is used.
 When combined with the much larger IV, this
defeats the well-known key recovery attacks
on WEP.
 WPA also provides vastly improved payload
integrity.
Wireless Network Security
 A more secure message authentication code
(usually known as a MAC, but here termed a MIC
for "Message Integrity Code") is used in WPA, an
algorithm named "Michael".
 The MIC used in WPA includes a frame counter,
which prevents replay attacks being executed.
 The Michael algorithm is a strong algorithm that
would still work with most older network cards.
 WPA includes a special countermeasure
mechanism that detects an attempt to break TKIP
and temporarily blocks communications with the
attacker.
Wireless Network Security
Wireless Network Security
WEP WPA
ENCRYPTION RC4 RC4
KEY ROTATION NONE Dynamic Session Keys
KEY
DISTRIBUTION
Manually typed into
each device
Automatic
distribution available
AUTHENTICATI
ON
Uses WEP key as
Authentication
Can use 802.1x &
EAP
1. It is easier to add or move workstations.
2. It is easier to provide connectivity in areas where it is difficult to lay
cable.
3. Installation is fast and easy, and it can eliminate the need to pull
cable through walls and ceilings.
4. Access to the network can be from anywhere within range of an
access point.
5.Portable or semi-permanent buildings can be connected using a
WLAN.
Wireless Network Security
1.As the number of computers using the network increases, the data
transfer rate to each computer will decrease accordingly.
2.Lower wireless bandwidth means some applications such as video
streaming will be more effective on a wired LAN.
3.Security is more difficult to guarantee and requires configuration.
4.Devices will only operate at a limited distance from an access point,
with the distance determined by the standard used and buildings and
other obstacles between the access point and the user.
Wireless Network Security
1.Wireless LANs very useful and convenient, but current security state
not ideal for sensitive environments.
2.Cahners In-Stat group predicts the market for wireless LANs will be $2.2
billion in 2004, up from $771 million in 2000.
3.Growing use and popularity require increased focus on security
Wireless Network Security
Thank You!
Wireless Network Security

More Related Content

What's hot

Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkSecurityTube.Net
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityAyoma Wijethunga
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networksMaghan Das
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2Tushar Anand
 

What's hot (20)

Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network Security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networks
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wifi security
Wifi securityWifi security
Wifi security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 

Similar to Shashank wireless lans security

4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Wireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by VijayWireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by Vijaythevijayps
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
 
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...IDES Editor
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyahSeptafiansyah P
 
Wireless security837
Wireless security837Wireless security837
Wireless security837mark scott
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALASaikiran Panjala
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.igede tirtanata
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 

Similar to Shashank wireless lans security (20)

4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Wireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by VijayWireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by Vijay
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Cisco discovery d homesb module 7 - v.4 in english.
Cisco discovery   d homesb module 7 - v.4 in english.Cisco discovery   d homesb module 7 - v.4 in english.
Cisco discovery d homesb module 7 - v.4 in english.
 
Wireless security
Wireless securityWireless security
Wireless security
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Shashank wireless lans security

  • 1.
  • 2. 1. Wireless Introduction 2. Wireless network modes 3. SSID 4. WEP 5. WPA 6. Advantages 7. Disadvantage 8. Conclusion Wireless Network Security
  • 3.  INTRO A Wireless LAN Links Two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider internet.  IEEE 802 series standards 802.11 – wireless LANs (LAN) 802.15 – wireless personal area networks (e.g., Bluetooth) 802.16 – wireless broadband up to 155Mb Wireless Network Security
  • 4.  802.11a – 54 Mbps@5 GHz  Not interoperable with 802.11b  Limited distance  Dual-mode APs require 2 chipsets, look like two APs to clients  Cisco products: Aironet 1200  802.11b – 11 Mbps@2.4 GHz  Full speed up to 300 feet  Coverage up to 1750 feet  Cisco products: Aironet 340, 350, 1100, 1200  802.11g – 54 Mbps@2.4 GHz  Same range as 802.11b  Backward-compatible with 802.11b  Speeds slower in dual-mode  Cisco products: Aironet 1100, 1200 Wireless Network Security
  • 5.  The 802.11 wireless networks operate in two basic modes: 1. Infrastructure mode 2. Ad-hoc mode  Infrastructure mode:  each wireless client connects directly to a central device called Access Point (AP)  No direct connection between wireless clients  AP acts as a wireless hub that performs the connections and handles them between wireless clients Wireless Network Security
  • 6.  The hub handles:  the clients’ authentication,  Authorization  link-level data security (access control and enabling data traffic encryption)  Ad-hoc mode:  Each wireless client connects directly with each other  No central device managing the connections  Rapid deployment of a temporal network where no infrastructures exist (advantage in case of disaster…)  Each node must maintain its proper authentication list Wireless Network Security
  • 7.  Identifies a particular wireless network  A client must set the same SSID as the one in that particular AP Point to join the network  Without SSID, the client won’t be able to select and join a wireless network  Hiding SSID is not a security measure because the wireless network in this case is not invisible  It can be defeated by intruders by sniffing it from any probe signal containing it. Wireless Network Security
  • 8.  The original native security mechanism for WLAN  provide security through a 802.11 network  Used to protect wireless communication from eavesdropping (confidentiality)  Prevent unauthorized access to a wireless network (access control)  Prevent tampering with transmitted messages  Provide users with the equivalent level of privacy inbuilt in wireless networks. Wireless Network Security
  • 9. 1. Appends a 32-bit CRC checksum to each outgoing frame (INTEGRITY) 2. Encrypts the frame using RC4 stream cipher = 40-bit (standard) or 104-bit (Enhanced) message keys + a 24-bit IV random initialization vector (CONFIDENTIALITY). 3. The Initialization Vector (IV) and default key on the station access point are used to create a key stream 4. The key stream is then used to convert the plain text message into the WEP encrypted frame. Wireless Network Security
  • 12.  Initialization Vector IV  Dynamic 24-bit value  Chosen randomly by the transmitter wireless network interface  16.7 million possible keys (224 )  Shared Secret Key  40 bits long (5 ASCII characters) when 64 bit key is used  104 bits long (13 ASCII characters) when 128 bit key is used   Wireless Network Security
  • 13. Wireless Network Security IV RC4 key IV encrypted packet original unencrypted packet checksum
  • 16. 1. The station sends an authentication request to AP 2. AP sends challenge text to the station. 3. The station uses its configured 64-bit or 128-bit default key to encrypt the challenge text, and it sends the latter to AP. 4. AP decrypts the encrypted text using its configured WEP key that corresponds to the station's default key. 5. AP compares the decrypted text with the original challenge text. 6. If the decrypted text matches the original challenge text, then the access point and the station share the same WEP key, and the access point authenticates the station. 7. The station connects to the network. Wireless Network Security
  • 18. Wireless Network Security WEP encrypted networks can be cracked in 10 minutes Goal is to collect enough IVs to be able to crack the key IV = Initialization Vector, plaintext appended to the key to avoid Repetition Injecting packets generates IVs
  • 19.  New technique in 2002  replacement of security flaws of WEP.  Improved data encryption  Strong user authentication  Because of many attacks related to static key, WPA minimize shared secret key in accordance with the frame transmission. Wireless Network Security
  • 20.  Data is encrypted using the RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV).  One major improvement in WPA over WEP is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used.  When combined with the much larger IV, this defeats the well-known key recovery attacks on WEP.  WPA also provides vastly improved payload integrity. Wireless Network Security
  • 21.  A more secure message authentication code (usually known as a MAC, but here termed a MIC for "Message Integrity Code") is used in WPA, an algorithm named "Michael".  The MIC used in WPA includes a frame counter, which prevents replay attacks being executed.  The Michael algorithm is a strong algorithm that would still work with most older network cards.  WPA includes a special countermeasure mechanism that detects an attempt to break TKIP and temporarily blocks communications with the attacker. Wireless Network Security
  • 22. Wireless Network Security WEP WPA ENCRYPTION RC4 RC4 KEY ROTATION NONE Dynamic Session Keys KEY DISTRIBUTION Manually typed into each device Automatic distribution available AUTHENTICATI ON Uses WEP key as Authentication Can use 802.1x & EAP
  • 23. 1. It is easier to add or move workstations. 2. It is easier to provide connectivity in areas where it is difficult to lay cable. 3. Installation is fast and easy, and it can eliminate the need to pull cable through walls and ceilings. 4. Access to the network can be from anywhere within range of an access point. 5.Portable or semi-permanent buildings can be connected using a WLAN. Wireless Network Security
  • 24. 1.As the number of computers using the network increases, the data transfer rate to each computer will decrease accordingly. 2.Lower wireless bandwidth means some applications such as video streaming will be more effective on a wired LAN. 3.Security is more difficult to guarantee and requires configuration. 4.Devices will only operate at a limited distance from an access point, with the distance determined by the standard used and buildings and other obstacles between the access point and the user. Wireless Network Security
  • 25. 1.Wireless LANs very useful and convenient, but current security state not ideal for sensitive environments. 2.Cahners In-Stat group predicts the market for wireless LANs will be $2.2 billion in 2004, up from $771 million in 2000. 3.Growing use and popularity require increased focus on security Wireless Network Security