SlideShare a Scribd company logo
1 of 15
WIRELESS LAN SECURITY 
Technology 
& Wireless LAN Security 
Science Presented By 
of SWAGAT SOURAV Roll # EE 200118189 
Institute Under the guidance of 
National Mr. Siddhartha Bhusan Neelamani 
[1] Swagat Sourav
WIRELESS LAN SECURITY 
Introduction 
[2] National Institute of Science & Technology 
• It is also easy to interfere with wireless communications. A 
simple jamming transmitter can make communications 
impossible. For example, consistently hammering an 
access point with access requests, whether successful or 
not, will eventually exhaust its available radio frequency 
spectrum and knock it off the network. 
• Advantages of WLAN 
• Disadvantages WLAN 
Swagat Sourav
WIRELESS LAN SECURITY 
WLAN Authentication 
[3] National Institute of Science & Technology 
• Wireless LANs, because of their broadcast nature, require the 
addition of: 
User authentication 
Data privacy 
• Authenticating wireless LAN clients. 
Client Authentication Process 
Swagat Sourav
WIRELESS LAN SECURITY 
WLAN Authentication 
Technology 
• Types Of Authentication 
 Open Authentication 
& • The authentication request 
Science • The authentication response 
 Shared Key Authentication 
• requires that the client configure a static WEP key 
of  Service Set Identifier (SSID) 
Institute  MAC Address Authentication 
National [4] • MAC address authentication verifies the client’s MAC 
address against a locally configured list of allowed 
addresses or against an external authentication server 
Swagat Sourav
WIRELESS LAN SECURITY 
WLAN Authentication Vulnerabilities 
• SSID 
[5] National Institute of Science & Technology 
An eavesdropper can easily determine the SSID with the use of an 
802.11 wireless LAN packet analyzer, like Sniffer Pro. 
• Open Authentication 
Open authentication provides no way for the access point to 
determine whether a client is valid. 
• Shared Key Authentication Vulnerabilities 
The process of exchanging the challenge text occurs over the 
wireless link and is vulnerable to a man-in-the-middle attack 
• MAC Address Authentication Vulnerabilities 
A protocol analyzer can be used to determine a valid MAC 
Swagat Sourav 
address
WIRELESS LAN SECURITY 
WEP Encryption 
[6] National Institute of Science & Technology 
• WEP is based on the RC4 algorithm, which is a symmetric 
key stream cipher. The encryption keys must match on both 
the client and the access point for frame exchanges to succeed 
 Stream Ciphers 
Encrypts data by generating a key stream from the key and 
performing the XOR function on the key stream with the plain-text 
data 
Swagat Sourav
WIRELESS LAN SECURITY 
WEP Encryption 
[7] National Institute of Science & Technology 
Swagat Sourav 
 Block Ciphers 
Fragments the frame into blocks of predetermined size and performs 
the XOR function on each block.
WIRELESS LAN SECURITY 
WEP Encryption Weaknesses 
[8] National Institute of Science & Technology 
• There are two encryption techniques to overcome WEP 
encryption weakness 
Initialization vectors 
Feedback modes 
• Initialization vectors 
Swagat Sourav
WIRELESS LAN SECURITY 
WEP Encryption Weaknesses 
• Feedback Modes 
[9] National Institute of Science & Technology 
Swagat Sourav
WIRELESS LAN SECURITY 
WEP Encryption Weaknesses 
Technology 
• Statistical Key Derivation—Passive Network Attacks 
& Science of Institute National [10] A WEP key could be derived by passively collecting particular frames 
from a wireless LAN 
• Inductive Key Derivation—Active Network Attacks 
Inductive key derivation is the process of deriving a key by coercing 
information from the wireless LAN 
 Initialization Vector Replay Attacks 
 Bit-Flipping Attacks 
• Static WEP Key Management Issues 
Swagat Sourav
WIRELESS LAN SECURITY 
Component of WLAN Security 
Technology 
• The Authentication Framework (802.1X) 
• The EAP Authentication Algorithm 
& Science  Mutual Authentication 
 User-Based Authentication 
 Dynamic WEP Keys 
of Institute • Data Privacy with TKIP (Temporal Key Integrity Protocol ) 
 A message integrity check (MIC 
 Per-packet keying 
National  Broadcast Key Rotation 
[11] Swagat Sourav
WIRELESS LAN SECURITY 
Future of WLAN Security 
Technology 
• AES (Advanced Encryption Standard ) 
 AES-OCB Mode 
& Science of Institute National [12] Swagat Sourav
WIRELESS LAN SECURITY 
Future of WLAN Security 
[13] National Institute of Science & Technology 
Swagat Sourav 
 AES-CCM Mode
WIRELESS LAN SECURITY 
Conclusion 
Technology 
Wireless LAN deployments should be made as secure 
as possible. Standard 802.11 security is weak and 
vulnerable to numerous network attacks. This paper has 
& highlighted these vulnerabilities and described how it 
Science can be solved to create secure wireless LANs. 
Some security enhancement features might not be 
of deployable in some situations because of device 
Institute limitations such as application specific devices (ASDs 
such as 802.11 phones capable of static WEP only) or 
mixed vendor environments. In such cases, it is 
National important that the network administrator understand the 
potential WLAN security vulnerabilities. 
[14] Swagat Sourav
WIRELESS LAN SECURITY 
Technology 
& Science Thank 
of Institute You!!! 
National [15] Swagat Sourav

More Related Content

What's hot (20)

Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
HiperLAN & Bluetooth.ppt
HiperLAN & Bluetooth.pptHiperLAN & Bluetooth.ppt
HiperLAN & Bluetooth.ppt
 
Wi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentationWi fi 6 (802.11ax) presentation
Wi fi 6 (802.11ax) presentation
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
WiMAX Basics
WiMAX Basics WiMAX Basics
WiMAX Basics
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communication
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
The mac layer
The mac layerThe mac layer
The mac layer
 
Microwave Phase shifter
Microwave Phase shifterMicrowave Phase shifter
Microwave Phase shifter
 
Wavelength division multiplexing
Wavelength division multiplexingWavelength division multiplexing
Wavelength division multiplexing
 
Unit 2 : common cellular system PPT
Unit 2 : common cellular system PPTUnit 2 : common cellular system PPT
Unit 2 : common cellular system PPT
 
MIMO in 15 minutes
MIMO in 15 minutesMIMO in 15 minutes
MIMO in 15 minutes
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 
Wimax
WimaxWimax
Wimax
 
Umts(3g)
Umts(3g)Umts(3g)
Umts(3g)
 
Massive mimo
Massive mimoMassive mimo
Massive mimo
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 

Viewers also liked

Viewers also liked (9)

802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wlan
WlanWlan
Wlan
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 

Similar to Wireless lan

Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaArpit Bhatia
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanZaibi Gondal
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan finalPREMKUMAR
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applicationscmstiernberg
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.pptabenimelos
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.pptNotSure11
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.pptMavaz
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 

Similar to Wireless lan (20)

Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Wifi
WifiWifi
Wifi
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 

More from Sajan Sahu

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middlewareSajan Sahu
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoySajan Sahu
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memorySajan Sahu
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraftSajan Sahu
 
Data compretion
Data compretionData compretion
Data compretionSajan Sahu
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseingSajan Sahu
 
Information system
Information systemInformation system
Information systemSajan Sahu
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)Sajan Sahu
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatSajan Sahu
 
Database system
Database systemDatabase system
Database systemSajan Sahu
 
Internet telephony
Internet telephonyInternet telephony
Internet telephonySajan Sahu
 

More from Sajan Sahu (20)

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoy
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
 
Data compretion
Data compretionData compretion
Data compretion
 
Deadlock
DeadlockDeadlock
Deadlock
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
 
Information system
Information systemInformation system
Information system
 
Dna computing
Dna computingDna computing
Dna computing
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
 
Database system
Database systemDatabase system
Database system
 
GPRS
GPRSGPRS
GPRS
 
Bios
BiosBios
Bios
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
802.11
802.11802.11
802.11
 
Erp
ErpErp
Erp
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Wcdma
WcdmaWcdma
Wcdma
 
Criptography
CriptographyCriptography
Criptography
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Wireless lan

  • 1. WIRELESS LAN SECURITY Technology & Wireless LAN Security Science Presented By of SWAGAT SOURAV Roll # EE 200118189 Institute Under the guidance of National Mr. Siddhartha Bhusan Neelamani [1] Swagat Sourav
  • 2. WIRELESS LAN SECURITY Introduction [2] National Institute of Science & Technology • It is also easy to interfere with wireless communications. A simple jamming transmitter can make communications impossible. For example, consistently hammering an access point with access requests, whether successful or not, will eventually exhaust its available radio frequency spectrum and knock it off the network. • Advantages of WLAN • Disadvantages WLAN Swagat Sourav
  • 3. WIRELESS LAN SECURITY WLAN Authentication [3] National Institute of Science & Technology • Wireless LANs, because of their broadcast nature, require the addition of: User authentication Data privacy • Authenticating wireless LAN clients. Client Authentication Process Swagat Sourav
  • 4. WIRELESS LAN SECURITY WLAN Authentication Technology • Types Of Authentication  Open Authentication & • The authentication request Science • The authentication response  Shared Key Authentication • requires that the client configure a static WEP key of  Service Set Identifier (SSID) Institute  MAC Address Authentication National [4] • MAC address authentication verifies the client’s MAC address against a locally configured list of allowed addresses or against an external authentication server Swagat Sourav
  • 5. WIRELESS LAN SECURITY WLAN Authentication Vulnerabilities • SSID [5] National Institute of Science & Technology An eavesdropper can easily determine the SSID with the use of an 802.11 wireless LAN packet analyzer, like Sniffer Pro. • Open Authentication Open authentication provides no way for the access point to determine whether a client is valid. • Shared Key Authentication Vulnerabilities The process of exchanging the challenge text occurs over the wireless link and is vulnerable to a man-in-the-middle attack • MAC Address Authentication Vulnerabilities A protocol analyzer can be used to determine a valid MAC Swagat Sourav address
  • 6. WIRELESS LAN SECURITY WEP Encryption [6] National Institute of Science & Technology • WEP is based on the RC4 algorithm, which is a symmetric key stream cipher. The encryption keys must match on both the client and the access point for frame exchanges to succeed  Stream Ciphers Encrypts data by generating a key stream from the key and performing the XOR function on the key stream with the plain-text data Swagat Sourav
  • 7. WIRELESS LAN SECURITY WEP Encryption [7] National Institute of Science & Technology Swagat Sourav  Block Ciphers Fragments the frame into blocks of predetermined size and performs the XOR function on each block.
  • 8. WIRELESS LAN SECURITY WEP Encryption Weaknesses [8] National Institute of Science & Technology • There are two encryption techniques to overcome WEP encryption weakness Initialization vectors Feedback modes • Initialization vectors Swagat Sourav
  • 9. WIRELESS LAN SECURITY WEP Encryption Weaknesses • Feedback Modes [9] National Institute of Science & Technology Swagat Sourav
  • 10. WIRELESS LAN SECURITY WEP Encryption Weaknesses Technology • Statistical Key Derivation—Passive Network Attacks & Science of Institute National [10] A WEP key could be derived by passively collecting particular frames from a wireless LAN • Inductive Key Derivation—Active Network Attacks Inductive key derivation is the process of deriving a key by coercing information from the wireless LAN  Initialization Vector Replay Attacks  Bit-Flipping Attacks • Static WEP Key Management Issues Swagat Sourav
  • 11. WIRELESS LAN SECURITY Component of WLAN Security Technology • The Authentication Framework (802.1X) • The EAP Authentication Algorithm & Science  Mutual Authentication  User-Based Authentication  Dynamic WEP Keys of Institute • Data Privacy with TKIP (Temporal Key Integrity Protocol )  A message integrity check (MIC  Per-packet keying National  Broadcast Key Rotation [11] Swagat Sourav
  • 12. WIRELESS LAN SECURITY Future of WLAN Security Technology • AES (Advanced Encryption Standard )  AES-OCB Mode & Science of Institute National [12] Swagat Sourav
  • 13. WIRELESS LAN SECURITY Future of WLAN Security [13] National Institute of Science & Technology Swagat Sourav  AES-CCM Mode
  • 14. WIRELESS LAN SECURITY Conclusion Technology Wireless LAN deployments should be made as secure as possible. Standard 802.11 security is weak and vulnerable to numerous network attacks. This paper has & highlighted these vulnerabilities and described how it Science can be solved to create secure wireless LANs. Some security enhancement features might not be of deployable in some situations because of device Institute limitations such as application specific devices (ASDs such as 802.11 phones capable of static WEP only) or mixed vendor environments. In such cases, it is National important that the network administrator understand the potential WLAN security vulnerabilities. [14] Swagat Sourav
  • 15. WIRELESS LAN SECURITY Technology & Science Thank of Institute You!!! National [15] Swagat Sourav