SlideShare a Scribd company logo
1 of 26
Wireless
Communication
Security
PREPARED BY:
MEET SONI
Introduction
Wireless: without wires or without physical conducting materials or carrier.
Communication: Information propagation from source to destination.
Wireless communication Transfer the information over a distance without
utilizing electric conductor or “Wires”
communications takes place "through the air" using radio frequencies.
Used to communicate from one device to another.
This technology is being increasingly deployed in many places.
It presents many advantages Productivity improves because of increased
accessibility to information resources .
Benefits: Convenience, Mobility, Productivity, Deployment, Expandability and
Cost.
Disadvantages are: Security, Range, Reliability, and Speed.
confidentiality, ensuring integrity,
security objectives same as with wired
networks: preserving
and maintaining availability of the
information and information systems.
Wireless Networks consists of Wireless Application Protocol(WAP).
WAP is Standard for communication between server applications and its
clients.
The general characteristics of the WAP are below:
1) Unlimited roaming and range:
location of the device is irrelevant.
2)Guarantee of Delivery:
All the data are send to devices
3)Dependability of Delivery
Data are accurate to deliver
4)Notification
5)Connectivity Options
Choosing a type of connection for instance
6)Millions of Users
7)Priority Alerts
8)Communication
9)Host Mobility
Settings on a network
10)Dynamic Encapsulation
Information and alerts about login and logout
Overview of Wireless Communications
In Wireless Communication
System, communication takes
place through the air.
In that, whenever any two or many
wireless devices wants to
communicates so they required
of network or
some kind
components...
Communication System
‘What is WIRELESS
TECHNOLOGIES?’
Wireless technologies can be
classified in different ways depending
on their range and topologies.
wireless technology is designed to
serve a specific usage segment.
The requirements of that’s are based
on a variety of variables, including
Bandwidth needs, Distance needs
and Power.
The classification we see in the figure
Wireless Technologies
Security threats on radio communication link
There are mainly 4 kinds of threats related to security, that’s are
Unauthorised disclosure (violation of confidentiality)
Confidentiality is a set of rules or a promise that limits access or places
restrictions on certain types of information.
An attacker listens to packets transferred on the wireless transmission medium,
without being detected, and stores them.
The packets contain user related data, either transmitted alone or in connection
with user traffic.
The user related data might be encrypted, if not the attacker is able to read,
This data can be used to track user behaviour and is a privacy problem.
Unauthorised modification of data (violation of integrity)
Security Threats
In this kind of security
threats, the send the data
or message to receiver.
But while transferring that
data or message, the third
person(hacker) hack the
data or message of sender.
Then modified them and
then send to receiver.
That’s kind of security
threats called as violation of
integrity
‘Unauthorised modification of data (violation of integrity)’
Security Threats
‘Unauthorised modification of data (violation of integrity)’
Security Threats
‘Unauthorised modification of data (violation of integrity)’
Security Threats
Disturbing network services (violation of availability)
This threat basically allows the attacker to use the wireless network to
send and receive messages without authorization.
An attacker intentionally interferes with the wireless transmission by
sending a bogus signal on the frequencies used by the wireless
transmission.
That’s called the Physical Jamming.
An attacker intentionally sends messages on the wireless medium to
confuse the victim.
This could for example be a management message telling the victim‘s
wireless device to disconnect.
That’s called the Logical jamming.
Security Threats
Repudiation
The sender can deny that he sent a particular message, which was
received by another wireless device.
This threat imposes problems for the receiving party, to reply and act on
received messages.
The receiver of a particular message can deny the reception of that
message.
The sending party can therefore not reply on messages sent.
Security Threats
DIFFERENT KINDS OF WIRELESS ATTACKS
Many different kinds of wireless attacks are possible, but we focus on some
main attacks, that’s are describe below.
Accidental association
Unauthorized access to company wireless and wired networks can come
from a number of different methods and intents.
Malicious association
“Malicious associations” are when wireless devices can be actively made by
crackers to connect to a company network through their cracking laptop
instead of a company access point (AP).
Wireless Attacks
DIFFERENT KINDS OF WIRELESS ATTACKS
Identity theft (MAC spoofing)
Identity theft (or MAC spoofing) occurs when a cracker is able to listen in on
network traffic and identify the MAC address of a computer with network
privileges.
Dnial-of-service attack
A Denial-of-Service attack occurs when an attacker continually bombards a
targeted AP (Access Point) or network with bogus requests, premature
successful connection messages, failure messages, and/or other commands.
These cause legitimate users to not be able to get on the network and may
even cause the network to crash.
WirelessAttacks
SECURITY GOALS
Authentication:
This means that before sending and receiving data using the system, the
receiver and sender identity should be verified.
Secrecy or Confidentiality:
Usually this function (feature) is how most people identify a secure system.
It means that only the authenticated people are able to interpret the message
(date) content and no one else.
Examples: Block Chipher and Stream Chipher
Security Requirement for wireless Network
SECURITY GOALS
Integrity:
Integrity means that the content of the communicated data is assured to be
free from any type of modification between the end points (sender and
receiver). The basic form of integrity is packet check sum in IPv4 packets.
Examples: Cryptography
Non-Repudiation:
This function implies that neither the sender nor the receiver can falsely deny
that they have sent a certain message.
Service Reliability and Availability:
Since secure systems usually get attacked by intruders, which may affect
their availability and type of service to their users. Such systems should
provide a way to grant their users the quality of service they expect.
Security Requirement for wireless Network
In this method data is encrypted and
decrypted if from of blocks.
In its simplest mode, we divide the plain text
into blocks which are then fed into the cipher
system to produce blocks of cipher text.
There are many variances of block cipher,
where different techniques are used to
strengthen the security of the system.
The most common methods are: ECB
(Electronic Codebook Mode).
ECB is the basic form of clock cipher where
data blocks are encrypted directly to
generate its correspondent ciphered blocks
Security Requirement for wireless Network
SECURITY GOALS-BLOCK CIPHER
Stream cipher functions on a stream
of data by operating on it bit by bit.
Stream cipher consists of two major
components: a key stream generator,
and a mixing function.
Mixing function is usually just an XOR
function, while key stream generator
is the main unit in stream cipher
encryption technique.
Security Requirement for wireless Network
SECURITY GOALS-STREAM CIPHER
SECURITY GOALS-DATA ENCRYPTION
STANDARDS
DES
DES (Data Encryption Standard), was the first encryption standard to be
recommended by NIST (National Institute of Standards and Technology).
It is based on the IBM proposed algorithm called Lucifer.
AES
AES(Advanced Encryption Standard), is the new encryption standard
recommended by NIST to replace DES.
Both AES and DES are block ciphers.
Security Requirement for wireless Network
RC4
RC4 or ARC-Four is the most widely used stream cipher.
It is used with SSL (Secure socket Layer), which is used to secure identification
information and money transfers over the Internet.
Security Requirement for wireless Network
SECURITY GOALS-DATA ENCRYPTION
STANDARDS
SECURITY GOALS-DATA ENCRYPTION
CRYPTOGRAPHY
To send data securely between two nodes, the system must encrypt the data or
"systematically scramble information so that it cannot be read without knowing
the coding key".
This concept is called as the Cryptography.
This operation determines to a certain level the strength of the security system,
the harder it is to break the encrypted message the more secure the system is
to be.
Security Requirement for wireless Network
plain text means the " The original
intelligible message” and Cipher text "
The transformed message”.
Data encryption procedures are mainly
categorized into two categories
depending on the type of security keys
used to encrypt/decrypt the secured
data.
These two categories are:
Asymmetric and Symmetric encryption
techniques.
Security Requirement for wireless Network
SECURITY GOALS-DATA ENCRYPTION
SECURITY GOALS-DATA ENCRYPTION
Symmetric Encryption
In this type of encryption, the sender and the receiver
agree on a secret (shared) key.
Then they use this secret key to encrypt and decrypt their sent messages.
Asymmetric Encryption
Asymmetric encryption is the other type of encryption where two keys are
used.
In that Key1 can encrypt only Key2 can decrypt, and vice versa.
It is also known as Public Key Cryptography (PKC), because users tend to use
two keys: public key, which is know to the public, and private key which is
known only to the user.
Security Requirement for wireless Network
Thank You

More Related Content

What's hot

Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and securityImran Khan
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
GSM & UMTS Security
GSM & UMTS SecurityGSM & UMTS Security
GSM & UMTS SecuritySohaib Altaf
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 

What's hot (20)

Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
GSM & UMTS Security
GSM & UMTS SecurityGSM & UMTS Security
GSM & UMTS Security
 
Network security
Network securityNetwork security
Network security
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Cia security model
Cia security modelCia security model
Cia security model
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
System security
System securitySystem security
System security
 
Email security
Email securityEmail security
Email security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 

Similar to wireless communication security PPT, presentation

Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction SecurityMeet Soni
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkSteven Wallach
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 
A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfRhonda Cetnar
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measureShivam Singh
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with securityeSAT Publishing House
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocolseSAT Journals
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network securitynikshaikh786
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver04
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network securityAnkit Anand
 

Similar to wireless communication security PPT, presentation (20)

Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
A Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdfA Review on Wireless Network Security.pdf
A Review on Wireless Network Security.pdf
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Network security
Network security Network security
Network security
 
Unit-1.pptx
Unit-1.pptxUnit-1.pptx
Unit-1.pptx
 

More from Nitesh Dubey

MLApproachToProgramming.ppt
MLApproachToProgramming.pptMLApproachToProgramming.ppt
MLApproachToProgramming.pptNitesh Dubey
 
seminar topic of holography.ppt
seminar topic of holography.pptseminar topic of holography.ppt
seminar topic of holography.pptNitesh Dubey
 
Compiler design.pdf
Compiler design.pdfCompiler design.pdf
Compiler design.pdfNitesh Dubey
 
Online shopping ppt
Online shopping pptOnline shopping ppt
Online shopping pptNitesh Dubey
 
Python lab manual all the experiments are available
Python lab manual all the experiments are availablePython lab manual all the experiments are available
Python lab manual all the experiments are availableNitesh Dubey
 
Web Technology Lab files with practical
Web Technology Lab  files with practicalWeb Technology Lab  files with practical
Web Technology Lab files with practicalNitesh Dubey
 
Theory of automata and formal language lab manual
Theory of automata and formal language lab manualTheory of automata and formal language lab manual
Theory of automata and formal language lab manualNitesh Dubey
 
Software engineering practical
Software engineering practicalSoftware engineering practical
Software engineering practicalNitesh Dubey
 
Principal of programming language lab files
Principal of programming language lab files Principal of programming language lab files
Principal of programming language lab files Nitesh Dubey
 
database management system lab files
database management system lab filesdatabase management system lab files
database management system lab filesNitesh Dubey
 
design and analysis of algorithm Lab files
design and analysis of algorithm Lab filesdesign and analysis of algorithm Lab files
design and analysis of algorithm Lab filesNitesh Dubey
 
Computer Organization And Architecture lab manual
Computer Organization And Architecture lab manualComputer Organization And Architecture lab manual
Computer Organization And Architecture lab manualNitesh Dubey
 
industrial training report on Ethical hacking
industrial training report on Ethical hackingindustrial training report on Ethical hacking
industrial training report on Ethical hackingNitesh Dubey
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceNitesh Dubey
 
Hrms industrial training report
Hrms industrial training reportHrms industrial training report
Hrms industrial training reportNitesh Dubey
 
Industrial training report on core java
Industrial training report on core java Industrial training report on core java
Industrial training report on core java Nitesh Dubey
 
SEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project reportSEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project reportNitesh Dubey
 
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMsynopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMNitesh Dubey
 
artificial intelligence ppt
artificial intelligence pptartificial intelligence ppt
artificial intelligence pptNitesh Dubey
 

More from Nitesh Dubey (20)

HTML Presentation
HTML  PresentationHTML  Presentation
HTML Presentation
 
MLApproachToProgramming.ppt
MLApproachToProgramming.pptMLApproachToProgramming.ppt
MLApproachToProgramming.ppt
 
seminar topic of holography.ppt
seminar topic of holography.pptseminar topic of holography.ppt
seminar topic of holography.ppt
 
Compiler design.pdf
Compiler design.pdfCompiler design.pdf
Compiler design.pdf
 
Online shopping ppt
Online shopping pptOnline shopping ppt
Online shopping ppt
 
Python lab manual all the experiments are available
Python lab manual all the experiments are availablePython lab manual all the experiments are available
Python lab manual all the experiments are available
 
Web Technology Lab files with practical
Web Technology Lab  files with practicalWeb Technology Lab  files with practical
Web Technology Lab files with practical
 
Theory of automata and formal language lab manual
Theory of automata and formal language lab manualTheory of automata and formal language lab manual
Theory of automata and formal language lab manual
 
Software engineering practical
Software engineering practicalSoftware engineering practical
Software engineering practical
 
Principal of programming language lab files
Principal of programming language lab files Principal of programming language lab files
Principal of programming language lab files
 
database management system lab files
database management system lab filesdatabase management system lab files
database management system lab files
 
design and analysis of algorithm Lab files
design and analysis of algorithm Lab filesdesign and analysis of algorithm Lab files
design and analysis of algorithm Lab files
 
Computer Organization And Architecture lab manual
Computer Organization And Architecture lab manualComputer Organization And Architecture lab manual
Computer Organization And Architecture lab manual
 
industrial training report on Ethical hacking
industrial training report on Ethical hackingindustrial training report on Ethical hacking
industrial training report on Ethical hacking
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
 
Hrms industrial training report
Hrms industrial training reportHrms industrial training report
Hrms industrial training report
 
Industrial training report on core java
Industrial training report on core java Industrial training report on core java
Industrial training report on core java
 
SEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project reportSEWAGE TREATMENT PLANT mini project report
SEWAGE TREATMENT PLANT mini project report
 
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEMsynopsis report on BIOMETRIC ONLINE VOTING SYSTEM
synopsis report on BIOMETRIC ONLINE VOTING SYSTEM
 
artificial intelligence ppt
artificial intelligence pptartificial intelligence ppt
artificial intelligence ppt
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

wireless communication security PPT, presentation

  • 2. Introduction Wireless: without wires or without physical conducting materials or carrier. Communication: Information propagation from source to destination. Wireless communication Transfer the information over a distance without utilizing electric conductor or “Wires” communications takes place "through the air" using radio frequencies. Used to communicate from one device to another. This technology is being increasingly deployed in many places. It presents many advantages Productivity improves because of increased accessibility to information resources . Benefits: Convenience, Mobility, Productivity, Deployment, Expandability and Cost.
  • 3. Disadvantages are: Security, Range, Reliability, and Speed. confidentiality, ensuring integrity, security objectives same as with wired networks: preserving and maintaining availability of the information and information systems. Wireless Networks consists of Wireless Application Protocol(WAP). WAP is Standard for communication between server applications and its clients. The general characteristics of the WAP are below: 1) Unlimited roaming and range: location of the device is irrelevant. 2)Guarantee of Delivery: All the data are send to devices
  • 4. 3)Dependability of Delivery Data are accurate to deliver 4)Notification 5)Connectivity Options Choosing a type of connection for instance 6)Millions of Users 7)Priority Alerts 8)Communication 9)Host Mobility Settings on a network 10)Dynamic Encapsulation Information and alerts about login and logout
  • 5. Overview of Wireless Communications In Wireless Communication System, communication takes place through the air. In that, whenever any two or many wireless devices wants to communicates so they required of network or some kind components...
  • 7. ‘What is WIRELESS TECHNOLOGIES?’ Wireless technologies can be classified in different ways depending on their range and topologies. wireless technology is designed to serve a specific usage segment. The requirements of that’s are based on a variety of variables, including Bandwidth needs, Distance needs and Power. The classification we see in the figure Wireless Technologies
  • 8. Security threats on radio communication link There are mainly 4 kinds of threats related to security, that’s are Unauthorised disclosure (violation of confidentiality) Confidentiality is a set of rules or a promise that limits access or places restrictions on certain types of information. An attacker listens to packets transferred on the wireless transmission medium, without being detected, and stores them. The packets contain user related data, either transmitted alone or in connection with user traffic. The user related data might be encrypted, if not the attacker is able to read, This data can be used to track user behaviour and is a privacy problem.
  • 9. Unauthorised modification of data (violation of integrity) Security Threats In this kind of security threats, the send the data or message to receiver. But while transferring that data or message, the third person(hacker) hack the data or message of sender. Then modified them and then send to receiver. That’s kind of security threats called as violation of integrity
  • 10. ‘Unauthorised modification of data (violation of integrity)’ Security Threats
  • 11. ‘Unauthorised modification of data (violation of integrity)’ Security Threats
  • 12. ‘Unauthorised modification of data (violation of integrity)’ Security Threats
  • 13. Disturbing network services (violation of availability) This threat basically allows the attacker to use the wireless network to send and receive messages without authorization. An attacker intentionally interferes with the wireless transmission by sending a bogus signal on the frequencies used by the wireless transmission. That’s called the Physical Jamming. An attacker intentionally sends messages on the wireless medium to confuse the victim. This could for example be a management message telling the victim‘s wireless device to disconnect. That’s called the Logical jamming. Security Threats
  • 14. Repudiation The sender can deny that he sent a particular message, which was received by another wireless device. This threat imposes problems for the receiving party, to reply and act on received messages. The receiver of a particular message can deny the reception of that message. The sending party can therefore not reply on messages sent. Security Threats
  • 15. DIFFERENT KINDS OF WIRELESS ATTACKS Many different kinds of wireless attacks are possible, but we focus on some main attacks, that’s are describe below. Accidental association Unauthorized access to company wireless and wired networks can come from a number of different methods and intents. Malicious association “Malicious associations” are when wireless devices can be actively made by crackers to connect to a company network through their cracking laptop instead of a company access point (AP). Wireless Attacks
  • 16. DIFFERENT KINDS OF WIRELESS ATTACKS Identity theft (MAC spoofing) Identity theft (or MAC spoofing) occurs when a cracker is able to listen in on network traffic and identify the MAC address of a computer with network privileges. Dnial-of-service attack A Denial-of-Service attack occurs when an attacker continually bombards a targeted AP (Access Point) or network with bogus requests, premature successful connection messages, failure messages, and/or other commands. These cause legitimate users to not be able to get on the network and may even cause the network to crash. WirelessAttacks
  • 17. SECURITY GOALS Authentication: This means that before sending and receiving data using the system, the receiver and sender identity should be verified. Secrecy or Confidentiality: Usually this function (feature) is how most people identify a secure system. It means that only the authenticated people are able to interpret the message (date) content and no one else. Examples: Block Chipher and Stream Chipher Security Requirement for wireless Network
  • 18. SECURITY GOALS Integrity: Integrity means that the content of the communicated data is assured to be free from any type of modification between the end points (sender and receiver). The basic form of integrity is packet check sum in IPv4 packets. Examples: Cryptography Non-Repudiation: This function implies that neither the sender nor the receiver can falsely deny that they have sent a certain message. Service Reliability and Availability: Since secure systems usually get attacked by intruders, which may affect their availability and type of service to their users. Such systems should provide a way to grant their users the quality of service they expect. Security Requirement for wireless Network
  • 19. In this method data is encrypted and decrypted if from of blocks. In its simplest mode, we divide the plain text into blocks which are then fed into the cipher system to produce blocks of cipher text. There are many variances of block cipher, where different techniques are used to strengthen the security of the system. The most common methods are: ECB (Electronic Codebook Mode). ECB is the basic form of clock cipher where data blocks are encrypted directly to generate its correspondent ciphered blocks Security Requirement for wireless Network SECURITY GOALS-BLOCK CIPHER
  • 20. Stream cipher functions on a stream of data by operating on it bit by bit. Stream cipher consists of two major components: a key stream generator, and a mixing function. Mixing function is usually just an XOR function, while key stream generator is the main unit in stream cipher encryption technique. Security Requirement for wireless Network SECURITY GOALS-STREAM CIPHER
  • 21. SECURITY GOALS-DATA ENCRYPTION STANDARDS DES DES (Data Encryption Standard), was the first encryption standard to be recommended by NIST (National Institute of Standards and Technology). It is based on the IBM proposed algorithm called Lucifer. AES AES(Advanced Encryption Standard), is the new encryption standard recommended by NIST to replace DES. Both AES and DES are block ciphers. Security Requirement for wireless Network
  • 22. RC4 RC4 or ARC-Four is the most widely used stream cipher. It is used with SSL (Secure socket Layer), which is used to secure identification information and money transfers over the Internet. Security Requirement for wireless Network SECURITY GOALS-DATA ENCRYPTION STANDARDS
  • 23. SECURITY GOALS-DATA ENCRYPTION CRYPTOGRAPHY To send data securely between two nodes, the system must encrypt the data or "systematically scramble information so that it cannot be read without knowing the coding key". This concept is called as the Cryptography. This operation determines to a certain level the strength of the security system, the harder it is to break the encrypted message the more secure the system is to be. Security Requirement for wireless Network
  • 24. plain text means the " The original intelligible message” and Cipher text " The transformed message”. Data encryption procedures are mainly categorized into two categories depending on the type of security keys used to encrypt/decrypt the secured data. These two categories are: Asymmetric and Symmetric encryption techniques. Security Requirement for wireless Network SECURITY GOALS-DATA ENCRYPTION
  • 25. SECURITY GOALS-DATA ENCRYPTION Symmetric Encryption In this type of encryption, the sender and the receiver agree on a secret (shared) key. Then they use this secret key to encrypt and decrypt their sent messages. Asymmetric Encryption Asymmetric encryption is the other type of encryption where two keys are used. In that Key1 can encrypt only Key2 can decrypt, and vice versa. It is also known as Public Key Cryptography (PKC), because users tend to use two keys: public key, which is know to the public, and private key which is known only to the user. Security Requirement for wireless Network