SlideShare a Scribd company logo
1 of 41
Computer and Network Security (UCS523)
(Unit-V:- Wireless Network Security)
(UG Course)
Network Security
(UG Course)
Dr. Navneet Sharma
Assistant professor, ECED
Thapar Institute of Engineering and Technology, Patiala, Punjab, India
Email:- navneet.sharma@thapar.edu
Outline
 IEEE 802.11i Wireless LAN Security
 Wireless Application Protocol Overview
 Wireless Transport Layer Security
 WAP End-to-End Security
Wireless Network Security
IEEE 802.11
 IEEE 802 committee for LAN standards.
 IEEE 802.11 formed in 1990’s.
 For developing a protocol & transmission specifications for wireless LANs (WLANs)
 Since then demand for WLANs, at different frequencies and data rates, has
exploded.
 Hence seen ever-expanding list of standards issued
Wireless Network Security
IEEE 802 Terminology
 Access Point (AP)
 Basic Service Set (BSS)
 Coordination Function
 Distribution Systems (DS)
 Extended Service Set (ESS)
 MAC Protocol Data Unit (MPDU)
 MAC Service Data Unit (MSDU)
 Station
Wireless Network Security
WI-FI Alliance
 802.11b first broadly accepted standard.
 Wireless Ethernet Compatibility Alliance (WECA) industry consortium formed
1999
 to assist interoperability of products
 renamed Wi-Fi (Wireless Fidelity) Alliance
 created a test suite to certify interoperability
 initially for 802.11b, later extended to 802.11g
 concerned with a range of WLANs markets, including enterprise, home, and hot spots
Wireless Network Security
IEEE 802.11 Services
Service Provider Used to Support
Association Distribution System MSDU delivery
Authentication Station LAN access and
security
De-authentication Station LAN access and
security
Di-association Distribution System MSDU delivery
Distribution Distribution System MSDU delivery
Integration Distribution System MSDU delivery
MSDU delivery Station MSDU delivery
Privacy Station LAN access and
security
Re-association Distribution System MSDU delivery
IEEE 802 WLAN Protocol Overview
IEEE 802 Protocol Architecture
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
IEEE 802 WLAN Protocol Overview
Network Components and Architecture
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
802.11 Wireless LAN Security
 Wireless traffic can be monitored by any radio in range, not physically connected.
 Original 802.11 specification had security features
 Wired Equivalent Privacy (WEP) algorithm
 but found this contained major weaknesses
 802.11i task group developed capabilities to address WLAN security issues
 Wi-Fi Alliance Wi-Fi Protected Access (WPA)
 final 802.11i Robust Security Network (RSN)
802.11i RSN Services and Protocols
Access
Control
Authentication
and key
generation
Confidentiality, data
origin authentication
and Integrity and
Replay Protection
IEEE 802.11
port-based
access control
Extensible
Authentication
protocol (EAP)
TKIP CCMP
Robust Security Network
Protocols
Services
802.11i RSN Cryptographic Algorithms
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
Computer and Network Security (UCS523)
(Unit-V:- Wireless Network Security)
(802.11i Phases of Operation)
(UG Course)
Network Security
(UG Course)
Dr. Navneet Sharma
Assistant professor, ECED
Thapar Institute of Engineering and Technology, Patiala, Punjab, India
Email:- navneet.sharma@thapar.edu
802.11i Phases of Operation
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
802.11i Discovery and Authentication
Phases
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
802.1X Access Control Approach
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
802.11i Key Management Phase
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
Fig. Group key hierarchy
802.11i Key Management Phase
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
802.11i Protected Data Transfer Phase
 It have two schemes for protecting data.
 Temporal Key Integrity Protocol (TKIP)
 Secure wireless changes only to older WEP
 adds 64-bit Michael message integrity code (MIC)
 encrypts MPDU plus MIC value using RC4
 Counter Mode-CBC MAC Protocol (CCMP)
 It uses the cipher block chaining message authentication code (CBC-MAC) for
integrity
 It uses the CRT block cipher mode of operation
IEEE 802.11i Pseudorandom Function
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
Computer and Network Security (UCS523)
(Unit-V:- Wireless Network Security)
{ Wireless Application Protocol (WAP) }
(UG Course)
Network Security
(UG Course)
Dr. Navneet Sharma
Assistant professor, ECED
Thapar Institute of Engineering and Technology, Patiala, Punjab, India
Email:- navneet.sharma@thapar.edu
Wireless Application Protocol (WAP)
 WAP is a universal, open standard developed to provide mobile wireless users
access to telephony and information services.
 It is having significant limitations of devices, networks, displays with wide
variations.
 WAP specification includes:
 programming model, markup language, small browser, lightweight communications
protocol stack, applications framework
WAP Programing Model
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
WAP Infrastructure
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
Wireless Mark-up Language
 It describes content and format for data display on devices with limited
bandwidth, screen size, and user input capability.
 Include features of this language are :
 text / image formatting and layout commands
 deck/card organizational metaphor
 support for navigation among cards and decks
 A card is one or more units of interaction.
 A deck is similar to an HTML page.
WAPArchitecture
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
WTP Gateway
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
WAP Protocol
 Wireless Session Protocol (WSP)
o It provides applications two session services
o It is connection-oriented and connectionless
o WSP is based on HTTP with optimizations
 Wireless Transaction Protocol (WTP)
o WTP manages transactions of requests / responses between a user agent & an
application server
o It also provides an efficient reliable transport service
 Wireless Datagram Protocol (WDP)
o It adapts higher-layer WAP protocol to communications
Computer and Network Security (UCS523)
(Unit-V:- Wireless Network Security)
{ Wireless Transport layer Security (WTLS) }
(UG Course)
Network Security
(UG Course)
Dr. Navneet Sharma
Assistant professor, ECED
Thapar Institute of Engineering and Technology, Patiala, Punjab, India
Email:- navneet.sharma@thapar.edu
WTLS
 It provides security services between mobile device (client) and WAP gateway
 provides data integrity, privacy, authentication, denial-of-service protection
 WTLS is based on TLS(Transport layer security)
 more efficient with fewer message exchanges
 use WTLS between the client and gateway
 use TLS between gateway and target server
 WAP gateway translates WTLS / TLS
WTLS Sessions and Connections
 secure connection
 a transport providing a suitable type of service
 connections are transient
 every connection is associated with 1 session
 secure session
 an association between a client and a server
 created by Handshake Protocol
 define set of cryptographic security parameters
 shared among multiple connections
WTLS Protocol Architecture
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
WTLS Record Protocol
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
WTLS Higher-Layer Protocol
 Change Cipher Spec Protocol
 simplest, to make pending state current
 Alert Protocol
 used to convey WTLS-related alerts to peer
 has severity: warning, critical, or fatal
 and specific alert type
 Handshake Protocol
 allow server & client to mutually authenticate
 negotiate encryption & MAC algorithms & keys
Handshake Protocol
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
Cryptographic Algorithms
 WTLS authentication
 uses certificates
 X.509v3, X9.68 and WTLS (optimized for size)
 can occur between client and server or client may only authenticates server
 WTLS key exchange
 generates a mutually shared pre-master key
 optional use server_key_exchange message
 for DH_anon, ECDH_anon, RSA_anon
 not needed for ECDH_ECDSA or RSA
Cryptographic Algorithms
 Pseudorandom Function (PRF)
 HMAC based, used for a number of purposes
 only one hash alg, agreed during handshake
 Master Key Generation
 of shared master secret
 master_secret = PRF( pre_master_secret, "master secret”,ClientHello.random ||
ServerHello.random )
 then derive MAC and encryption keys
 Encryption with RC5, DES, 3DES, IDEA
Computer and Network Security (UCS523)
(Unit-V:- Wireless Network Security)
(WAP End- to-End Security)
(UG Course)
Network Security
(UG Course)
Dr. Navneet Sharma
Assistant professor, ECED
Thapar Institute of Engineering and Technology, Patiala, Punjab, India
Email:- navneet.sharma@thapar.edu
WAP End-to-End Security
 It is having security gap end-to-end
 at gateway between WTLS & TLS domains
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
WAP2 End-to-End Security
Fig. a. TLS-based Security
Fig. b. IPSec based Security
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
WAP2 End-to-End Security
Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
Summary
 This module have considered:
 IEEE 802.11 Wireless LANs
 protocol overview and security
 Wireless Application Protocol (WAP)
 protocol overview
 Wireless Transport Layer Security (WTLS)
 Wireless End-to-End Security

More Related Content

Similar to lecture_5.pptx

Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEric Vanderburg
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Dr. Amarjeet Singh
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALASaikiran Panjala
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptxstephen972973
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISIJNSA Journal
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
 

Similar to lecture_5.pptx (20)

Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALA
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Darsh
DarshDarsh
Darsh
 
1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx1.2 Wireless Local Area Netw BASICS.pptx
1.2 Wireless Local Area Netw BASICS.pptx
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 

lecture_5.pptx

  • 1. Computer and Network Security (UCS523) (Unit-V:- Wireless Network Security) (UG Course) Network Security (UG Course) Dr. Navneet Sharma Assistant professor, ECED Thapar Institute of Engineering and Technology, Patiala, Punjab, India Email:- navneet.sharma@thapar.edu
  • 2. Outline  IEEE 802.11i Wireless LAN Security  Wireless Application Protocol Overview  Wireless Transport Layer Security  WAP End-to-End Security
  • 3. Wireless Network Security IEEE 802.11  IEEE 802 committee for LAN standards.  IEEE 802.11 formed in 1990’s.  For developing a protocol & transmission specifications for wireless LANs (WLANs)  Since then demand for WLANs, at different frequencies and data rates, has exploded.  Hence seen ever-expanding list of standards issued
  • 4. Wireless Network Security IEEE 802 Terminology  Access Point (AP)  Basic Service Set (BSS)  Coordination Function  Distribution Systems (DS)  Extended Service Set (ESS)  MAC Protocol Data Unit (MPDU)  MAC Service Data Unit (MSDU)  Station
  • 5. Wireless Network Security WI-FI Alliance  802.11b first broadly accepted standard.  Wireless Ethernet Compatibility Alliance (WECA) industry consortium formed 1999  to assist interoperability of products  renamed Wi-Fi (Wireless Fidelity) Alliance  created a test suite to certify interoperability  initially for 802.11b, later extended to 802.11g  concerned with a range of WLANs markets, including enterprise, home, and hot spots
  • 6. Wireless Network Security IEEE 802.11 Services Service Provider Used to Support Association Distribution System MSDU delivery Authentication Station LAN access and security De-authentication Station LAN access and security Di-association Distribution System MSDU delivery Distribution Distribution System MSDU delivery Integration Distribution System MSDU delivery MSDU delivery Station MSDU delivery Privacy Station LAN access and security Re-association Distribution System MSDU delivery
  • 7. IEEE 802 WLAN Protocol Overview IEEE 802 Protocol Architecture Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 8. IEEE 802 WLAN Protocol Overview Network Components and Architecture Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 9. 802.11 Wireless LAN Security  Wireless traffic can be monitored by any radio in range, not physically connected.  Original 802.11 specification had security features  Wired Equivalent Privacy (WEP) algorithm  but found this contained major weaknesses  802.11i task group developed capabilities to address WLAN security issues  Wi-Fi Alliance Wi-Fi Protected Access (WPA)  final 802.11i Robust Security Network (RSN)
  • 10. 802.11i RSN Services and Protocols Access Control Authentication and key generation Confidentiality, data origin authentication and Integrity and Replay Protection IEEE 802.11 port-based access control Extensible Authentication protocol (EAP) TKIP CCMP Robust Security Network Protocols Services
  • 11. 802.11i RSN Cryptographic Algorithms Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 12. Computer and Network Security (UCS523) (Unit-V:- Wireless Network Security) (802.11i Phases of Operation) (UG Course) Network Security (UG Course) Dr. Navneet Sharma Assistant professor, ECED Thapar Institute of Engineering and Technology, Patiala, Punjab, India Email:- navneet.sharma@thapar.edu
  • 13. 802.11i Phases of Operation Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 14. 802.11i Discovery and Authentication Phases Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 15. 802.1X Access Control Approach Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 16. 802.11i Key Management Phase Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed Fig. Group key hierarchy
  • 17. 802.11i Key Management Phase Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 18. 802.11i Protected Data Transfer Phase  It have two schemes for protecting data.  Temporal Key Integrity Protocol (TKIP)  Secure wireless changes only to older WEP  adds 64-bit Michael message integrity code (MIC)  encrypts MPDU plus MIC value using RC4  Counter Mode-CBC MAC Protocol (CCMP)  It uses the cipher block chaining message authentication code (CBC-MAC) for integrity  It uses the CRT block cipher mode of operation
  • 19. IEEE 802.11i Pseudorandom Function Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 20. Computer and Network Security (UCS523) (Unit-V:- Wireless Network Security) { Wireless Application Protocol (WAP) } (UG Course) Network Security (UG Course) Dr. Navneet Sharma Assistant professor, ECED Thapar Institute of Engineering and Technology, Patiala, Punjab, India Email:- navneet.sharma@thapar.edu
  • 21. Wireless Application Protocol (WAP)  WAP is a universal, open standard developed to provide mobile wireless users access to telephony and information services.  It is having significant limitations of devices, networks, displays with wide variations.  WAP specification includes:  programming model, markup language, small browser, lightweight communications protocol stack, applications framework
  • 22. WAP Programing Model Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 23. WAP Infrastructure Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 24. Wireless Mark-up Language  It describes content and format for data display on devices with limited bandwidth, screen size, and user input capability.  Include features of this language are :  text / image formatting and layout commands  deck/card organizational metaphor  support for navigation among cards and decks  A card is one or more units of interaction.  A deck is similar to an HTML page.
  • 25. WAPArchitecture Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 26. WTP Gateway Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 27. WAP Protocol  Wireless Session Protocol (WSP) o It provides applications two session services o It is connection-oriented and connectionless o WSP is based on HTTP with optimizations  Wireless Transaction Protocol (WTP) o WTP manages transactions of requests / responses between a user agent & an application server o It also provides an efficient reliable transport service  Wireless Datagram Protocol (WDP) o It adapts higher-layer WAP protocol to communications
  • 28. Computer and Network Security (UCS523) (Unit-V:- Wireless Network Security) { Wireless Transport layer Security (WTLS) } (UG Course) Network Security (UG Course) Dr. Navneet Sharma Assistant professor, ECED Thapar Institute of Engineering and Technology, Patiala, Punjab, India Email:- navneet.sharma@thapar.edu
  • 29. WTLS  It provides security services between mobile device (client) and WAP gateway  provides data integrity, privacy, authentication, denial-of-service protection  WTLS is based on TLS(Transport layer security)  more efficient with fewer message exchanges  use WTLS between the client and gateway  use TLS between gateway and target server  WAP gateway translates WTLS / TLS
  • 30. WTLS Sessions and Connections  secure connection  a transport providing a suitable type of service  connections are transient  every connection is associated with 1 session  secure session  an association between a client and a server  created by Handshake Protocol  define set of cryptographic security parameters  shared among multiple connections
  • 31. WTLS Protocol Architecture Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 32. WTLS Record Protocol Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 33. WTLS Higher-Layer Protocol  Change Cipher Spec Protocol  simplest, to make pending state current  Alert Protocol  used to convey WTLS-related alerts to peer  has severity: warning, critical, or fatal  and specific alert type  Handshake Protocol  allow server & client to mutually authenticate  negotiate encryption & MAC algorithms & keys
  • 34. Handshake Protocol Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 35. Cryptographic Algorithms  WTLS authentication  uses certificates  X.509v3, X9.68 and WTLS (optimized for size)  can occur between client and server or client may only authenticates server  WTLS key exchange  generates a mutually shared pre-master key  optional use server_key_exchange message  for DH_anon, ECDH_anon, RSA_anon  not needed for ECDH_ECDSA or RSA
  • 36. Cryptographic Algorithms  Pseudorandom Function (PRF)  HMAC based, used for a number of purposes  only one hash alg, agreed during handshake  Master Key Generation  of shared master secret  master_secret = PRF( pre_master_secret, "master secret”,ClientHello.random || ServerHello.random )  then derive MAC and encryption keys  Encryption with RC5, DES, 3DES, IDEA
  • 37. Computer and Network Security (UCS523) (Unit-V:- Wireless Network Security) (WAP End- to-End Security) (UG Course) Network Security (UG Course) Dr. Navneet Sharma Assistant professor, ECED Thapar Institute of Engineering and Technology, Patiala, Punjab, India Email:- navneet.sharma@thapar.edu
  • 38. WAP End-to-End Security  It is having security gap end-to-end  at gateway between WTLS & TLS domains Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 39. WAP2 End-to-End Security Fig. a. TLS-based Security Fig. b. IPSec based Security Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 40. WAP2 End-to-End Security Source:- Cryptography and Network Security, Principles and Practice, W. Stallings, Prentice Hall (2007), 5’th Ed
  • 41. Summary  This module have considered:  IEEE 802.11 Wireless LANs  protocol overview and security  Wireless Application Protocol (WAP)  protocol overview  Wireless Transport Layer Security (WTLS)  Wireless End-to-End Security