SlideShare a Scribd company logo
I E S College Of Engineering
Dept .Of Electronics And Communication Engineering
SEMINAR : A SURVEY ON WIRELESS SECURITY: TECHNICAL CHALLENGES
AND FUTURE TRENDS
Guided By : Ms.LINU BABU Presented By: SARATH K
CONTENTS
INTRODUCTION
LITERATURE SURVEY
OSI ARCHITECTURE
SECURITY VULNERIBILITIES
WIRELESS NETWORKS
UPCOMING TRENDS
CONCLUSION
REFERENCE
INTRODUCTION
Wireless communication is a widely used technology nowadays.
The number of mobile subscribers has reached 6.8 billion worldwide and
almost 40% of the world’s population is now using the Internet.
Due to broadcast nature wireless communication is vulnerable to security
threats like Hacking , Eavesdropping , Malicious attacks etc…
It is of paramount importance to improve wireless communications security
to fight against cybercriminal activities
LITERATURE SURVEY
Wireless Communication Security Requirements :
AUTHENTICITY : Differentiate Authorized from unauthorized users
CONFIDENTIALITY : Limit confidential data access to intended users only
INTEGRITY : Guarantee accuracy of the transmitted info without falsification
AVAILABILITY : Make sure authorised user is able to acces the network
whenever needed
GENERIC WIRELESS OSI LAYERED ARCHITECTURE
OSI LAYERED ARCHITECTURE
Common for both wired and wireless communication systems
Each layer is separately protected using various mechanisms such as MAC
Address, WPA/WPA2,Cryptographic Keys etc…
Physical and MAC Layer differs for wireless communication
Each layer supports various protocols like HTTP,FTP,TCP,UDP etc…
Each layer is vulnerable to different type of attacks like Eaves dropping,
MAC spoofing, Malware attack ,Jamming etc…
SECURITY VULTERABILITIES
PHYSICAL LAYER ATTACKS
 The broadcast nature of wireless communications makes its physical layer
extremely vulnerable to external attacks
 Jamming (DoS Attack) and Eavesdropping are two main attacks considering
physical layer.
Typically cryptographic techniques relying on secret keys are adopted for
preventing eavesdropping attacks from intercepting the data transmission.
Spread spectrum techniques are effective means of defending against DoS
attacks by spreading the transmit signal over a wider spectral bandwidth than its
original frequency band (FHSS /DSSS)
MAC LAYER ATTACKS
Each network node is equipped with a NIC and has a unique MAC address,
which is used for user authentication
An attacker that attempts to change its assigned MAC address with a
malicious intention is termed as MAC spoofing
A MAC attacker may overhear the network traffic and steal a legitimate
node’s MAC address by analysing the overheard traffic is referred to as an
Identity-theft attack
MITM Attack is the impersonation of a pair of communicating nodes.
NETWORK LAYER ATTACKS
The network-layer attacks mainly aim for exploiting IP weaknesses
Main network layer attacks are IP Spoofing , IP Hijacking and Smurfing.
 Falsification of IP address is called IP Spoofing
Impersonation of legitimate users IP Address is IP Hijacking
Paralysation of a network by sending huge number of ICMP Requests is
called Smurf Attacking
TRANSPORT LAYER ATTACKS
Malicious activity in transport layer is mainly TCP and UDP Attacks.
TCP attacks include TCP flooding attacks and sequence number prediction
attacks is a DoS attack in the transport layer.
TCP Flooding is due to sending huge number of Ping requests.
UDP Flooding is due to launching over whelming number of UDP packets.
APPLICATION LAYER ATTACKS
The application layer supports HTTP for web services, FTP for file
transfer and SMTP for e-mail transmission.
application-layer attacks may hence be classified as HTTP attacks, FTP
attacks, and SMTP attacks
The main HTTP attacks include the malware attack (e.g., Trojan horse,
viruses, worms, backdoors, key loggers, etc.)
WIRELESS NETWORKS
BLUETOOTH
WIFI
WI-MAX
Long Term Evolution (LTE)
BLUETOOTH
Bluetooth is a short-range and low-power wireless networking standard
The authentication represents the process of verifying the identity of
Bluetooth devices based on the BD_ADDR
Both the verifier and claimant perform the same authentication function
using the random number AU RANDA
the link key to obtain their responses denoted by SRES’ and SRES
BLUETOOTH: WORKING
WIFI
The family of Wi-Fi networks mainly based on the IEEE 802.11
The most common security protocols in Wi-Fi are referred to as WEP and
WPA
The WEP protocol consists of two main parts, namely the authentication
part and encryption part. preventing unauthorized access without an
appropriate WEP key
The main advantage of WPA over WEP is that WPA employs more
powerful data encryption
WIFI
WI-MAX
Protocol stack of wimax defines 2 Layers. PHY Layer and MAC Layer
LONG TERM EVOLUTION
LTE is the most recent standard developed by the 3G partnership project for
next-generation mobile networks
Its also the dominant technology used for 4G and upcoming 5G Technology
An LTE network typically consists of an EPC and an E-UTRAN
The EPC comprises an MME, a serving gateway, a packet data network
gateway (PDN GW), and an HSS
The E-UTRAN includes a base station (also termed as eNodeB in LTE) and
several UE
LTE
UPCOMING TRENDS
This section presents a range of challenging open issues and future
directions for wireless security research
Mixed Attacks in Wireless Networks
Joint Optimization of Security, Reliability, and Throughput
Cross-Layer Wireless Security Design and Analysis
Physical-Layer Security for the Emerging 5G Systems
Mixed Attacks in Wireless Networks
Most of the physical-layer security research only addressed the
eavesdropping attacks
The joint consideration of different types of wireless attacks, such as
eavesdropping and DoS attacks
It will be of particularly importance to explore new techniques of jointly
defending against multiple types of wireless attacks, which may be termed
as Mixed wireless attacks
JOINT OPTIMISATION
Security, reliability, and throughput constitute the main driving factors for
the research and development of wireless networks
It is necessary to investigate the joint optimization of security, reliability,
and throughput
It helps maintaining secure, reliable, and high-rate wireless
communications, which is an open challenge to be solved in the future.
Cross-Layer Wireless Security
Presently, cross-layer-aided security design is in its infancy.
The goal of wireless cross-layer-aided security design is to enable efficient
information exchange among different protocol layers for the sake of
improving the level of wireless security with minimal network overhead
In Conventional OSI Each layer separately protected adding complexity
and latency
It will be of high interest to explore the benefits of cross-layer-aided
wireless security for added efficiency against multiple attacks.
Physical-Layer Security for the Emerging 5G Systems
Mobile traffic has substantially grown in recent years and it may soon
exceed the capacity of the operational fourth-generation (4G)
It is expected that a strict security requirement is desired for the 5G systems
Physical-layer security as a beneficial complement to conventional security
mechanisms will have a great potential in the context of 5G systems.
It is of high importance to explore the opportunities and challenges of
combining the physical-layer security techniques with 5G
CONCLUSION
Survey of the wireless security challenges and defence mechanisms
conceived for protecting the authenticity, confidentiality, integrity, and
availability of wireless transmissions against malicious attacks
Discussed modern and conventional threats and vulnerabilities faced in
wireless communication
Discussed about popular wireless communication methods and safety
measures
Discussed about modern wireless technologies and modern trends in
wireless security
REFERENCES
A Survey on Wireless Security: Technical Challenges, RecentAdvances, and Future
Trends by Yulong Zou, Senior Member IEEE, Jia Zhu, Xianbin Wang, Senior Member
IEEE, and Lajos Hanzo, Fellow IEEE
O. Aliu, A. Imran, M. Imran, and B. Evans, “A survey of self-organisation in future
cellular networks,” IEEE Commune. Survey. Tut. vol. 15, no. 1, pp. 336–361, Feb. 2013.
C. Elliott, “Quantum cryptography,” IEEE Security Privacy, vol. 2, no. 4, pp. 57–61, Apr.
2004.
G. Raju and R. Akbani, “Authentication in wireless networks,” in Proc. 40th
Annu.Hawaii Int. Conf. Syst. Sci.,Waikoloa, HI,USA,
W. Stalling, Cryptography and Network Security: Principles and Practices, 3rd Ed.
Englewood Cliffs, NJ, USA: Prentice-Hall, Jan. 2010.

More Related Content

What's hot

Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
Pushpa Yakkala
 
Day 8 2 distance vector routing
Day 8 2 distance vector routingDay 8 2 distance vector routing
Day 8 2 distance vector routing
CYBERINTELLIGENTS
 
terrorism in pakistan
terrorism in pakistanterrorism in pakistan
terrorism in pakistan
Xee Shani
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Shahid Beheshti University
 
Application security
Application securityApplication security
Application security
Hagar Alaa el-din
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
IPV6 Addressing
IPV6 Addressing IPV6 Addressing
IPV6 Addressing
Heba_a
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
KarthicaMarasamy
 
Social problems of Pakistan
Social problems of PakistanSocial problems of Pakistan
Social problems of Pakistan
Ali Ahmed
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
kentquirk
 
Explaining ip address
Explaining ip addressExplaining ip address
Explaining ip address
MohsinHusenManasiya
 
Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Agris Ameriks
 
General pervaiz musharaf presentation
General pervaiz musharaf presentationGeneral pervaiz musharaf presentation
General pervaiz musharaf presentation
Waleed Asif
 
Wpa3
Wpa3Wpa3
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
Nil Menon
 
WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
Huda Seyam
 
Dos attack
Dos attackDos attack
Dos attack
Manjushree Mashal
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
Damien Magoni
 
Terrorism in pakistan
Terrorism in pakistanTerrorism in pakistan
Terrorism in pakistan
iamttak
 

What's hot (20)

Basics of Ethernet
Basics of Ethernet Basics of Ethernet
Basics of Ethernet
 
Day 8 2 distance vector routing
Day 8 2 distance vector routingDay 8 2 distance vector routing
Day 8 2 distance vector routing
 
terrorism in pakistan
terrorism in pakistanterrorism in pakistan
terrorism in pakistan
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Application security
Application securityApplication security
Application security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
IPV6 Addressing
IPV6 Addressing IPV6 Addressing
IPV6 Addressing
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Social problems of Pakistan
Social problems of PakistanSocial problems of Pakistan
Social problems of Pakistan
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Explaining ip address
Explaining ip addressExplaining ip address
Explaining ip address
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
General pervaiz musharaf presentation
General pervaiz musharaf presentationGeneral pervaiz musharaf presentation
General pervaiz musharaf presentation
 
Wpa3
Wpa3Wpa3
Wpa3
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
 
Dos attack
Dos attackDos attack
Dos attack
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
Terrorism in pakistan
Terrorism in pakistanTerrorism in pakistan
Terrorism in pakistan
 

Similar to A Survey On Wireless security

A Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksA Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless Networks
Scott Bou
 
1Table of Contents.docx
1Table of Contents.docx1Table of Contents.docx
1Table of Contents.docx
felicidaddinwoodie
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Security
ijtsrd
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
IJAEMSJORNAL
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
CSCJournals
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
International Journal for management Science and Technology - https://www.ijmst.com/
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
IJNSA Journal
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
Thesis Scientist Private Limited
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
IJNSA Journal
 
7215nsa05
7215nsa057215nsa05
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
iosrjce
 
N010617783
N010617783N010617783
N010617783
IOSR Journals
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
poonamjindal6
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
Ram kumar
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
IJNSA Journal
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
IJNSA Journal
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
IJNSA Journal
 

Similar to A Survey On Wireless security (20)

A Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless NetworksA Literature Review Of Security Threats To Wireless Networks
A Literature Review Of Security Threats To Wireless Networks
 
1Table of Contents.docx
1Table of Contents.docx1Table of Contents.docx
1Table of Contents.docx
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Security
 
an overview of wireless local area networks and security system
an overview of wireless local area networks and security systeman overview of wireless local area networks and security system
an overview of wireless local area networks and security system
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
JCC_2015120915212763
JCC_2015120915212763JCC_2015120915212763
JCC_2015120915212763
 
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
N010617783
N010617783N010617783
N010617783
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
 

Recently uploaded

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

A Survey On Wireless security

  • 1. I E S College Of Engineering Dept .Of Electronics And Communication Engineering SEMINAR : A SURVEY ON WIRELESS SECURITY: TECHNICAL CHALLENGES AND FUTURE TRENDS Guided By : Ms.LINU BABU Presented By: SARATH K
  • 2. CONTENTS INTRODUCTION LITERATURE SURVEY OSI ARCHITECTURE SECURITY VULNERIBILITIES WIRELESS NETWORKS UPCOMING TRENDS CONCLUSION REFERENCE
  • 3. INTRODUCTION Wireless communication is a widely used technology nowadays. The number of mobile subscribers has reached 6.8 billion worldwide and almost 40% of the world’s population is now using the Internet. Due to broadcast nature wireless communication is vulnerable to security threats like Hacking , Eavesdropping , Malicious attacks etc… It is of paramount importance to improve wireless communications security to fight against cybercriminal activities
  • 4. LITERATURE SURVEY Wireless Communication Security Requirements : AUTHENTICITY : Differentiate Authorized from unauthorized users CONFIDENTIALITY : Limit confidential data access to intended users only INTEGRITY : Guarantee accuracy of the transmitted info without falsification AVAILABILITY : Make sure authorised user is able to acces the network whenever needed
  • 5. GENERIC WIRELESS OSI LAYERED ARCHITECTURE
  • 6. OSI LAYERED ARCHITECTURE Common for both wired and wireless communication systems Each layer is separately protected using various mechanisms such as MAC Address, WPA/WPA2,Cryptographic Keys etc… Physical and MAC Layer differs for wireless communication Each layer supports various protocols like HTTP,FTP,TCP,UDP etc… Each layer is vulnerable to different type of attacks like Eaves dropping, MAC spoofing, Malware attack ,Jamming etc…
  • 7. SECURITY VULTERABILITIES PHYSICAL LAYER ATTACKS  The broadcast nature of wireless communications makes its physical layer extremely vulnerable to external attacks  Jamming (DoS Attack) and Eavesdropping are two main attacks considering physical layer. Typically cryptographic techniques relying on secret keys are adopted for preventing eavesdropping attacks from intercepting the data transmission. Spread spectrum techniques are effective means of defending against DoS attacks by spreading the transmit signal over a wider spectral bandwidth than its original frequency band (FHSS /DSSS)
  • 8. MAC LAYER ATTACKS Each network node is equipped with a NIC and has a unique MAC address, which is used for user authentication An attacker that attempts to change its assigned MAC address with a malicious intention is termed as MAC spoofing A MAC attacker may overhear the network traffic and steal a legitimate node’s MAC address by analysing the overheard traffic is referred to as an Identity-theft attack MITM Attack is the impersonation of a pair of communicating nodes.
  • 9. NETWORK LAYER ATTACKS The network-layer attacks mainly aim for exploiting IP weaknesses Main network layer attacks are IP Spoofing , IP Hijacking and Smurfing.  Falsification of IP address is called IP Spoofing Impersonation of legitimate users IP Address is IP Hijacking Paralysation of a network by sending huge number of ICMP Requests is called Smurf Attacking
  • 10. TRANSPORT LAYER ATTACKS Malicious activity in transport layer is mainly TCP and UDP Attacks. TCP attacks include TCP flooding attacks and sequence number prediction attacks is a DoS attack in the transport layer. TCP Flooding is due to sending huge number of Ping requests. UDP Flooding is due to launching over whelming number of UDP packets.
  • 11. APPLICATION LAYER ATTACKS The application layer supports HTTP for web services, FTP for file transfer and SMTP for e-mail transmission. application-layer attacks may hence be classified as HTTP attacks, FTP attacks, and SMTP attacks The main HTTP attacks include the malware attack (e.g., Trojan horse, viruses, worms, backdoors, key loggers, etc.)
  • 13. BLUETOOTH Bluetooth is a short-range and low-power wireless networking standard The authentication represents the process of verifying the identity of Bluetooth devices based on the BD_ADDR Both the verifier and claimant perform the same authentication function using the random number AU RANDA the link key to obtain their responses denoted by SRES’ and SRES
  • 15. WIFI The family of Wi-Fi networks mainly based on the IEEE 802.11 The most common security protocols in Wi-Fi are referred to as WEP and WPA The WEP protocol consists of two main parts, namely the authentication part and encryption part. preventing unauthorized access without an appropriate WEP key The main advantage of WPA over WEP is that WPA employs more powerful data encryption
  • 16. WIFI
  • 17. WI-MAX Protocol stack of wimax defines 2 Layers. PHY Layer and MAC Layer
  • 18. LONG TERM EVOLUTION LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks Its also the dominant technology used for 4G and upcoming 5G Technology An LTE network typically consists of an EPC and an E-UTRAN The EPC comprises an MME, a serving gateway, a packet data network gateway (PDN GW), and an HSS The E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE
  • 19. LTE
  • 20. UPCOMING TRENDS This section presents a range of challenging open issues and future directions for wireless security research Mixed Attacks in Wireless Networks Joint Optimization of Security, Reliability, and Throughput Cross-Layer Wireless Security Design and Analysis Physical-Layer Security for the Emerging 5G Systems
  • 21. Mixed Attacks in Wireless Networks Most of the physical-layer security research only addressed the eavesdropping attacks The joint consideration of different types of wireless attacks, such as eavesdropping and DoS attacks It will be of particularly importance to explore new techniques of jointly defending against multiple types of wireless attacks, which may be termed as Mixed wireless attacks
  • 22. JOINT OPTIMISATION Security, reliability, and throughput constitute the main driving factors for the research and development of wireless networks It is necessary to investigate the joint optimization of security, reliability, and throughput It helps maintaining secure, reliable, and high-rate wireless communications, which is an open challenge to be solved in the future.
  • 23. Cross-Layer Wireless Security Presently, cross-layer-aided security design is in its infancy. The goal of wireless cross-layer-aided security design is to enable efficient information exchange among different protocol layers for the sake of improving the level of wireless security with minimal network overhead In Conventional OSI Each layer separately protected adding complexity and latency It will be of high interest to explore the benefits of cross-layer-aided wireless security for added efficiency against multiple attacks.
  • 24. Physical-Layer Security for the Emerging 5G Systems Mobile traffic has substantially grown in recent years and it may soon exceed the capacity of the operational fourth-generation (4G) It is expected that a strict security requirement is desired for the 5G systems Physical-layer security as a beneficial complement to conventional security mechanisms will have a great potential in the context of 5G systems. It is of high importance to explore the opportunities and challenges of combining the physical-layer security techniques with 5G
  • 25. CONCLUSION Survey of the wireless security challenges and defence mechanisms conceived for protecting the authenticity, confidentiality, integrity, and availability of wireless transmissions against malicious attacks Discussed modern and conventional threats and vulnerabilities faced in wireless communication Discussed about popular wireless communication methods and safety measures Discussed about modern wireless technologies and modern trends in wireless security
  • 26. REFERENCES A Survey on Wireless Security: Technical Challenges, RecentAdvances, and Future Trends by Yulong Zou, Senior Member IEEE, Jia Zhu, Xianbin Wang, Senior Member IEEE, and Lajos Hanzo, Fellow IEEE O. Aliu, A. Imran, M. Imran, and B. Evans, “A survey of self-organisation in future cellular networks,” IEEE Commune. Survey. Tut. vol. 15, no. 1, pp. 336–361, Feb. 2013. C. Elliott, “Quantum cryptography,” IEEE Security Privacy, vol. 2, no. 4, pp. 57–61, Apr. 2004. G. Raju and R. Akbani, “Authentication in wireless networks,” in Proc. 40th Annu.Hawaii Int. Conf. Syst. Sci.,Waikoloa, HI,USA, W. Stalling, Cryptography and Network Security: Principles and Practices, 3rd Ed. Englewood Cliffs, NJ, USA: Prentice-Hall, Jan. 2010.