Wlan networking and security

452 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
452
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
40
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Wlan networking and security

  1. 1. 1 Wireless LAN (Networking and Security) Presented By Akshay N Mahajan
  2. 2. 2 • Exists in infrastructure mode or ad hoc mode . • ad hoc mode : Clients communicate without the aid of a Central access Point. • Infrastructure mode : Usually a WLAN connected with a wired network. WIRELESS ( LOCAL AREA NETWORK )
  3. 3. 3 TYPES OF WIRELESS LANs • Infrared LAN : Used to connect computers within a room.They can’t penetrate opaque walls. • Spread Spectrum LAN : Uses the spread spectrum technology to communicate. • Narrowband microwave : Use micro waves to communicate.
  4. 4. 4 TECHNOLOGY VIEW (Standards for wireless LAN) • Hyper LAN : It’s an European telecommunication standards institutes (ETSI) standard. • Bluetooth : Specified by Bluetooth special interest group.Used for short range wireless connectivity. • 802.11 wireless technology : Specified by the IEEE(Institute of Electrical & Electronics).
  5. 5. 5 WIRELESS LANs ARE TARGETS • Medium for communication air hence most insecure. • Constantly hammering an access point with access requests can cause jamming. • Interference with other wireless services using the same frequency range e.g. Bluetooth.
  6. 6. 6 WIRELESS LANs ARE TERGETS • MAC authentication fail in front of firmware using randomly chosen spoofed address. • In case of ad hoc modes any hacker with a adapter configured for ad hoc mode can easily access the peer to peer network.
  7. 7. 7 SECURING THE WIRELESS NETWORKS • Checking the rogue access points. • WEP (Wired Equivalent Privacy) frame encryption. • IP sec (Internet protocol security) . • 802.1x/EAP :
  8. 8. 8 1)ROGUE ACCESS POINTS • A rogue access point is one that is accessible to an organizations employees but is not managed as a part of the trusted network (with no security measures enabled).
  9. 9. 9 2)WEP FRAME ENCRYPTION • Process of converting clear text to cipher text. Decryption is reverse of the process. • Key is the only piece of information to be shared by both the end points.
  10. 10. 10 2)WEP HAS FLAWS • Static WEP keying calls for the tiring job of entering the same keys on every device. • If a device using static WEP key is lost, the possessor of the device can be easily access the LAN. • WEP uses RC4 encryption.Which becomes unsafe when initialization vector is repeated.
  11. 11. 11 2) TKIP & AES (WEP Enhancements) • TKIP include per packet keying and message integrity check. • AES, a stronger alternative to RC4.
  12. 12. 12 3) IPsec (Internet Protocol security) • IPsec design is a frame work for multiple services like secrecy, data integrity and protection from replay attacks. • Consists of 2 parts : 1st carries security identifier 2nd deals with establishing keys • Used in Transport mode and Tunnel mode.
  13. 13. 13 4) 802.1x/EAP EAP(Extensible Authentication Protocol) types LEAP (widely deployed EAP type in use today) TLS uses digital certificates for both user and server authentication PEAP Uses digital certificate for server authentication EAP (frame work for providing centralized authentication and dynamic key distribution)
  14. 14. 14 THE EAP AUTHENTICATION PROCESS
  15. 15. 15 THE LEAP AUTHENTICATION PROCESS
  16. 16. 16 THE TLS AUTHENTICATION PROCESS
  17. 17. 17 Much more to be done • Wireless communication still prone to insecurities. • Stronger and full proof encryption techniques , than the currently used RC4must be developed. • Much more research needed in the design field of wireless technology.

×