SlideShare a Scribd company logo
1 of 26
Wireless
Communication
Security
PREPARED BY:
MEET SONI
Introduction
 Wireless: without wires or without physical conducting materials or carrier.
 Communication: Information propagation from source to destination.
 Wireless communication Transfer the information over a distance without
utilizing electric conductor or “Wires”
 communications takes place "through the air" using radio frequencies.
 Used to communicate from one device to another.
 This technology is being increasingly deployed in many places.
 It presents many advantages Productivity improves because of increased
accessibility to information resources .
 Benefits: Convenience, Mobility, Productivity, Deployment, Expandability and
Cost.
 Disadvantages are: Security, Range, Reliability, and Speed.
 security objectives same as with wired networks: preserving
confidentiality, ensuring integrity, and maintaining availability of the
information and information systems.
 Wireless Networks consists of Wireless Application Protocol(WAP).
 WAP is Standard for communication between server applications and its
clients.
 The general characteristics of the WAP are below:
1) Unlimited roaming and range:
location of the device is irrelevant.
2)Guarantee of Delivery:
All the data are send to devices
3)Dependability of Delivery
Data are accurate to deliver
4)Notification
5)Connectivity Options
Choosing a type of connection for instance
6)Millions of Users
7)Priority Alerts
8)Communication
9)Host Mobility
Settings on a network
10)Dynamic Encapsulation
Information and alerts about login and logout
Overview of Wireless Communications
 In Wireless Communication
System, communication takes
place through the air.
 In that, whenever any two or many
wireless devices wants to
communicates so they required
some kind of network or
components...
Communication System
‘What is WIRELESS
TECHNOLOGIES?’
 Wireless technologies can be
classified in different ways depending
on their range and topologies.
 wireless technology is designed to
serve a specific usage segment.
 The requirements of that’s are based
on a variety of variables, including
Bandwidth needs, Distance needs
and Power.
 The classification we see in the figure
Wireless Technologies
Security threats on radio communication link
 There are mainly 4 kinds of threats related to security, that’s are
 Unauthorised disclosure (violation of confidentiality)
 Confidentiality is a set of rules or a promise that limits access or places
restrictions on certain types of information.
 An attacker listens to packets transferred on the wireless transmission medium,
without being detected, and stores them.
 The packets contain user related data, either transmitted alone or in connection
with user traffic.
 The user related data might be encrypted, if not the attacker is able to read,
This data can be used to track user behaviour and is a privacy problem.
Unauthorised modification of data (violation of integrity)
Security Threats
 In this kind of security
threats, the send the data
or message to receiver.
 But while transferring that
data or message, the third
person(hacker) hack the
data or message of sender.
 Then modified them and
then send to receiver.
 That’s kind of security
threats called as violation of
integrity
‘Unauthorised modification of data (violation of integrity)’
Security Threats
‘Unauthorised modification of data (violation of integrity)’
Security Threats
‘Unauthorised modification of data (violation of integrity)’
Security Threats
Disturbing network services (violation of availability)
 This threat basically allows the attacker to use the wireless network to
send and receive messages without authorization.
 An attacker intentionally interferes with the wireless transmission by
sending a bogus signal on the frequencies used by the wireless
transmission.
 That’s called the Physical Jamming.
 An attacker intentionally sends messages on the wireless medium to
confuse the victim.
 This could for example be a management message telling the victim‘s
wireless device to disconnect.
 That’s called the Logical jamming.
Security Threats
Repudiation
 The sender can deny that he sent a particular message, which was
received by another wireless device.
 This threat imposes problems for the receiving party, to reply and act on
received messages.
 The receiver of a particular message can deny the reception of that
message.
 The sending party can therefore not reply on messages sent.
Security Threats
DIFFERENT KINDS OF WIRELESS ATTACKS
 Many different kinds of wireless attacks are possible, but we focus on some
main attacks, that’s are describe below.
 Accidental association
 Unauthorized access to company wireless and wired networks can come
from a number of different methods and intents.
 Malicious association
 “Malicious associations” are when wireless devices can be actively made by
crackers to connect to a company network through their cracking laptop
instead of a company access point (AP).
Wireless Attacks
DIFFERENT KINDS OF WIRELESS ATTACKS
 Identity theft (MAC spoofing)
 Identity theft (or MAC spoofing) occurs when a cracker is able to listen in on
network traffic and identify the MAC address of a computer with network
privileges.
 Dnial-of-service attack
 A Denial-of-Service attack occurs when an attacker continually bombards a
targeted AP (Access Point) or network with bogus requests, premature
successful connection messages, failure messages, and/or other commands.
These cause legitimate users to not be able to get on the network and may
even cause the network to crash.
Wireless Attacks
SECURITY GOALS
 Authentication:
 This means that before sending and receiving data using the system, the
receiver and sender identity should be verified.
 Secrecy or Confidentiality:
 Usually this function (feature) is how most people identify a secure system.
 It means that only the authenticated people are able to interpret the message
(date) content and no one else.
 Examples: Block Chipher and Stream Chipher
Security Requirement for wireless Network
SECURITY GOALS
 Integrity:
 Integrity means that the content of the communicated data is assured to be
free from any type of modification between the end points (sender and
receiver). The basic form of integrity is packet check sum in IPv4 packets.
Examples: Cryptography
 Non-Repudiation:
 This function implies that neither the sender nor the receiver can falsely deny
that they have sent a certain message.
 Service Reliability and Availability:
 Since secure systems usually get attacked by intruders, which may affect
their availability and type of service to their users. Such systems should
provide a way to grant their users the quality of service they expect.
Security Requirement for wireless Network
SECURITY GOALS-BLOCK CIPHER
 In this method data is encrypted and
decrypted if from of blocks.
 In its simplest mode, we divide the plain text
into blocks which are then fed into the cipher
system to produce blocks of cipher text.
 There are many variances of block cipher,
where different techniques are used to
strengthen the security of the system.
 The most common methods are: ECB
(Electronic Codebook Mode).
 ECB is the basic form of clock cipher where
data blocks are encrypted directly to
generate its correspondent ciphered blocks
Security Requirement for wireless Network
SECURITY GOALS-STREAM CIPHER
 Stream cipher functions on a stream
of data by operating on it bit by bit.
Stream cipher consists of two major
components: a key stream generator,
and a mixing function.
 Mixing function is usually just an
XOR function, while key stream
generator is the main unit in stream
cipher encryption technique.
Security Requirement for wireless Network
SECURITY GOALS-DATA ENCRYPTION
STANDARDS
 DES
 DES (Data Encryption Standard), was the first encryption standard to be
recommended by NIST (National Institute of Standards and Technology).
 It is based on the IBM proposed algorithm called Lucifer.
 AES
 AES(Advanced Encryption Standard), is the new encryption standard
recommended by NIST to replace DES.
 Both AES and DES are block ciphers.
Security Requirement for wireless Network
SECURITY GOALS-DATA ENCRYPTION
STANDARDS
 RC4
 RC4 or ARC-Four is the most widely used stream cipher.
 It is used with SSL (Secure socket Layer), which is used to secure identification
information and money transfers over the Internet.
Security Requirement for wireless Network
SECURITY GOALS-DATA ENCRYPTION
 CRYPTOGRAPHY
 To send data securely between two nodes, the system must encrypt the data or
"systematically scramble information so that it cannot be read without knowing
the coding key".
 This concept is called as the Cryptography.
 This operation determines to a certain level the strength of the security system,
the harder it is to break the encrypted message the more secure the system is
to be.
Security Requirement for wireless Network
SECURITY GOALS-DATA ENCRYPTION
 plain text means the " The original
intelligible message” and Cipher text "
The transformed message”.
 Data encryption procedures are mainly
categorized into two categories
depending on the type of security keys
used to encrypt/decrypt the secured
data.
 These two categories are:
 Asymmetric and Symmetric encryption
techniques.
Security Requirement for wireless Network
SECURITY GOALS-DATA ENCRYPTION
 Symmetric Encryption
 In this type of encryption, the sender and the receiver agree on a secret
(shared) key.
 Then they use this secret key to encrypt and decrypt their sent messages.
 Asymmetric Encryption
 Asymmetric encryption is the other type of encryption where two keys are
used.
 In that Key1 can encrypt only Key2 can decrypt, and vice versa.
 It is also known as Public Key Cryptography (PKC), because users tend to
use two keys: public key, which is know to the public, and private key which is
known only to the user.
Security Requirement for wireless Network
Thank You

More Related Content

What's hot

Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
Okehie Collins
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
Saikat Chaudhuri
 
Intruders
IntrudersIntruders
Intruders
techn
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 

What's hot (20)

امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
Network Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure SelectionNetwork Intrusion Detection and Countermeasure Selection
Network Intrusion Detection and Countermeasure Selection
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Network security
Network securityNetwork security
Network security
 
Network Attack and Intrusion Prevention System
Network Attack and  Intrusion Prevention System Network Attack and  Intrusion Prevention System
Network Attack and Intrusion Prevention System
 
Ch20
Ch20Ch20
Ch20
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
 
Network security
Network securityNetwork security
Network security
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
Intruders
IntrudersIntruders
Intruders
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Ch18
Ch18Ch18
Ch18
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 

Viewers also liked

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (9)

Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
Accelerator Innovation Network Event: Session 2
Accelerator Innovation Network Event: Session 2 Accelerator Innovation Network Event: Session 2
Accelerator Innovation Network Event: Session 2
 
Cyber Security Entrepreneurship (for Women in Security)
Cyber Security Entrepreneurship (for Women in Security)Cyber Security Entrepreneurship (for Women in Security)
Cyber Security Entrepreneurship (for Women in Security)
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
Realtime communication security - SIP, XMPP and others
Realtime communication security - SIP, XMPP and othersRealtime communication security - SIP, XMPP and others
Realtime communication security - SIP, XMPP and others
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Wireless Communiction Security

Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
sandeepsandy75
 

Similar to Wireless Communiction Security (20)

Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdf
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Network security
Network security Network security
Network security
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network Security
 
PROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY pptPROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY ppt
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 

Recently uploaded

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Recently uploaded (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 

Wireless Communiction Security

  • 2. Introduction  Wireless: without wires or without physical conducting materials or carrier.  Communication: Information propagation from source to destination.  Wireless communication Transfer the information over a distance without utilizing electric conductor or “Wires”  communications takes place "through the air" using radio frequencies.  Used to communicate from one device to another.  This technology is being increasingly deployed in many places.  It presents many advantages Productivity improves because of increased accessibility to information resources .  Benefits: Convenience, Mobility, Productivity, Deployment, Expandability and Cost.
  • 3.  Disadvantages are: Security, Range, Reliability, and Speed.  security objectives same as with wired networks: preserving confidentiality, ensuring integrity, and maintaining availability of the information and information systems.  Wireless Networks consists of Wireless Application Protocol(WAP).  WAP is Standard for communication between server applications and its clients.  The general characteristics of the WAP are below: 1) Unlimited roaming and range: location of the device is irrelevant. 2)Guarantee of Delivery: All the data are send to devices
  • 4. 3)Dependability of Delivery Data are accurate to deliver 4)Notification 5)Connectivity Options Choosing a type of connection for instance 6)Millions of Users 7)Priority Alerts 8)Communication 9)Host Mobility Settings on a network 10)Dynamic Encapsulation Information and alerts about login and logout
  • 5. Overview of Wireless Communications  In Wireless Communication System, communication takes place through the air.  In that, whenever any two or many wireless devices wants to communicates so they required some kind of network or components...
  • 7. ‘What is WIRELESS TECHNOLOGIES?’  Wireless technologies can be classified in different ways depending on their range and topologies.  wireless technology is designed to serve a specific usage segment.  The requirements of that’s are based on a variety of variables, including Bandwidth needs, Distance needs and Power.  The classification we see in the figure Wireless Technologies
  • 8. Security threats on radio communication link  There are mainly 4 kinds of threats related to security, that’s are  Unauthorised disclosure (violation of confidentiality)  Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information.  An attacker listens to packets transferred on the wireless transmission medium, without being detected, and stores them.  The packets contain user related data, either transmitted alone or in connection with user traffic.  The user related data might be encrypted, if not the attacker is able to read, This data can be used to track user behaviour and is a privacy problem.
  • 9. Unauthorised modification of data (violation of integrity) Security Threats  In this kind of security threats, the send the data or message to receiver.  But while transferring that data or message, the third person(hacker) hack the data or message of sender.  Then modified them and then send to receiver.  That’s kind of security threats called as violation of integrity
  • 10. ‘Unauthorised modification of data (violation of integrity)’ Security Threats
  • 11. ‘Unauthorised modification of data (violation of integrity)’ Security Threats
  • 12. ‘Unauthorised modification of data (violation of integrity)’ Security Threats
  • 13. Disturbing network services (violation of availability)  This threat basically allows the attacker to use the wireless network to send and receive messages without authorization.  An attacker intentionally interferes with the wireless transmission by sending a bogus signal on the frequencies used by the wireless transmission.  That’s called the Physical Jamming.  An attacker intentionally sends messages on the wireless medium to confuse the victim.  This could for example be a management message telling the victim‘s wireless device to disconnect.  That’s called the Logical jamming. Security Threats
  • 14. Repudiation  The sender can deny that he sent a particular message, which was received by another wireless device.  This threat imposes problems for the receiving party, to reply and act on received messages.  The receiver of a particular message can deny the reception of that message.  The sending party can therefore not reply on messages sent. Security Threats
  • 15. DIFFERENT KINDS OF WIRELESS ATTACKS  Many different kinds of wireless attacks are possible, but we focus on some main attacks, that’s are describe below.  Accidental association  Unauthorized access to company wireless and wired networks can come from a number of different methods and intents.  Malicious association  “Malicious associations” are when wireless devices can be actively made by crackers to connect to a company network through their cracking laptop instead of a company access point (AP). Wireless Attacks
  • 16. DIFFERENT KINDS OF WIRELESS ATTACKS  Identity theft (MAC spoofing)  Identity theft (or MAC spoofing) occurs when a cracker is able to listen in on network traffic and identify the MAC address of a computer with network privileges.  Dnial-of-service attack  A Denial-of-Service attack occurs when an attacker continually bombards a targeted AP (Access Point) or network with bogus requests, premature successful connection messages, failure messages, and/or other commands. These cause legitimate users to not be able to get on the network and may even cause the network to crash. Wireless Attacks
  • 17. SECURITY GOALS  Authentication:  This means that before sending and receiving data using the system, the receiver and sender identity should be verified.  Secrecy or Confidentiality:  Usually this function (feature) is how most people identify a secure system.  It means that only the authenticated people are able to interpret the message (date) content and no one else.  Examples: Block Chipher and Stream Chipher Security Requirement for wireless Network
  • 18. SECURITY GOALS  Integrity:  Integrity means that the content of the communicated data is assured to be free from any type of modification between the end points (sender and receiver). The basic form of integrity is packet check sum in IPv4 packets. Examples: Cryptography  Non-Repudiation:  This function implies that neither the sender nor the receiver can falsely deny that they have sent a certain message.  Service Reliability and Availability:  Since secure systems usually get attacked by intruders, which may affect their availability and type of service to their users. Such systems should provide a way to grant their users the quality of service they expect. Security Requirement for wireless Network
  • 19. SECURITY GOALS-BLOCK CIPHER  In this method data is encrypted and decrypted if from of blocks.  In its simplest mode, we divide the plain text into blocks which are then fed into the cipher system to produce blocks of cipher text.  There are many variances of block cipher, where different techniques are used to strengthen the security of the system.  The most common methods are: ECB (Electronic Codebook Mode).  ECB is the basic form of clock cipher where data blocks are encrypted directly to generate its correspondent ciphered blocks Security Requirement for wireless Network
  • 20. SECURITY GOALS-STREAM CIPHER  Stream cipher functions on a stream of data by operating on it bit by bit. Stream cipher consists of two major components: a key stream generator, and a mixing function.  Mixing function is usually just an XOR function, while key stream generator is the main unit in stream cipher encryption technique. Security Requirement for wireless Network
  • 21. SECURITY GOALS-DATA ENCRYPTION STANDARDS  DES  DES (Data Encryption Standard), was the first encryption standard to be recommended by NIST (National Institute of Standards and Technology).  It is based on the IBM proposed algorithm called Lucifer.  AES  AES(Advanced Encryption Standard), is the new encryption standard recommended by NIST to replace DES.  Both AES and DES are block ciphers. Security Requirement for wireless Network
  • 22. SECURITY GOALS-DATA ENCRYPTION STANDARDS  RC4  RC4 or ARC-Four is the most widely used stream cipher.  It is used with SSL (Secure socket Layer), which is used to secure identification information and money transfers over the Internet. Security Requirement for wireless Network
  • 23. SECURITY GOALS-DATA ENCRYPTION  CRYPTOGRAPHY  To send data securely between two nodes, the system must encrypt the data or "systematically scramble information so that it cannot be read without knowing the coding key".  This concept is called as the Cryptography.  This operation determines to a certain level the strength of the security system, the harder it is to break the encrypted message the more secure the system is to be. Security Requirement for wireless Network
  • 24. SECURITY GOALS-DATA ENCRYPTION  plain text means the " The original intelligible message” and Cipher text " The transformed message”.  Data encryption procedures are mainly categorized into two categories depending on the type of security keys used to encrypt/decrypt the secured data.  These two categories are:  Asymmetric and Symmetric encryption techniques. Security Requirement for wireless Network
  • 25. SECURITY GOALS-DATA ENCRYPTION  Symmetric Encryption  In this type of encryption, the sender and the receiver agree on a secret (shared) key.  Then they use this secret key to encrypt and decrypt their sent messages.  Asymmetric Encryption  Asymmetric encryption is the other type of encryption where two keys are used.  In that Key1 can encrypt only Key2 can decrypt, and vice versa.  It is also known as Public Key Cryptography (PKC), because users tend to use two keys: public key, which is know to the public, and private key which is known only to the user. Security Requirement for wireless Network