SlideShare a Scribd company logo
1 of 4
   Beacons are frames broadcast by the access point to
    advertise the SSID of the WLAN to wireless clients
   Probes are frames used by WLAN clients to find a
    WLAN network
   Authentication and Association is the process for
    establishing the data link between an access point and
    a WLAN client
The Join Process:
 Beacons are broadcast at regular intervals by an access
  point. Beacons allow a client to discover what WLANS are
  available in the current location.
    ◦ It populates the Wireless connection list on a Windows host
   Probes are sent by client stations on multiple channels. The
    probe request contains the SSID of the WLAN the client
    wants to join and supported bit rates.
    ◦ A client can send out a probe request with no SSID specified. All
      access points that receive the probe will respond except those with
      broadcast SSID disabled.
   The access point responds with a probe response that
    includes the SSID, supported data rates and security
    standard e.g. WPA2
To authenticate the wireless client to the access point
 Open authentication (NULL request)
    ◦ The client device requests authentication to the access point
    ◦ Four hello packets with NULL verification (no password or keys are provided or
      expected) exchanged and the access points responds with YES
    ◦ Open authentication allows the device to start the join process – Choose OPEN to
      allow WPA and WPA2 security protocols provide strong authentication at a later
      stage
    ◦ This is the current default method
   Shared key authentication
    ◦ This method uses a WEP Wired Equivalency Protection key
       The client device sends an authentication request to the access point.
       The access point sends a challenge back to the client
       The client encrypts the challenge with the shared WEP key and sends it back to the
        access point.
       The access point decrypts the encrypted challenge and if it matches the original challenge
        the access point authenticates the client
    ◦ WEP was an interim security protocol used while WPA was in development.
    ◦          Don’t use WEP as it can be broken very quickly
Association
 The client device scans all channels and listens for beacons
  and responses to probes
 The client device associates to the access point with the
  strongest signal (if EBSS)
 The SSID, MAC address and security settings are sent from
  the client device to the access point
 The access point maps a logical port called the association
  identifier AID for the WLAN to the clients MAC address (its
  like a port on a switch)

The wireless device has joined the WLAN

More Related Content

What's hot

Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génératione-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere générationSylvain Maret
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lectureMartyn Price
 
Wired equivalent privacy by SecArmour
 Wired equivalent privacy by SecArmour Wired equivalent privacy by SecArmour
Wired equivalent privacy by SecArmourSec Armour
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?Tom Isaacson
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 

What's hot (20)

Iuwne10 S04 L02
Iuwne10 S04 L02Iuwne10 S04 L02
Iuwne10 S04 L02
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
Wifi security
Wifi securityWifi security
Wifi security
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
WEP
WEPWEP
WEP
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génératione-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
 
Iuwne10 S04 L05
Iuwne10 S04 L05Iuwne10 S04 L05
Iuwne10 S04 L05
 
Wired equivalent privacy by SecArmour
 Wired equivalent privacy by SecArmour Wired equivalent privacy by SecArmour
Wired equivalent privacy by SecArmour
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wlan security
Wlan securityWlan security
Wlan security
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 

Viewers also liked

Памятники от простых до элитных г.Оренбург. ..
Памятники от простых до элитных г.Оренбург. ..Памятники от простых до элитных г.Оренбург. ..
Памятники от простых до элитных г.Оренбург. ..tominpavel
 
Signals1
Signals1Signals1
Signals1lyndyv
 
φυλλομετριτες
φυλλομετριτεςφυλλομετριτες
φυλλομετριτεςgiaki3
 
ηλεκτρονική παρενόχληση
ηλεκτρονική παρενόχλησηηλεκτρονική παρενόχληση
ηλεκτρονική παρενόχλησηgiaki3
 
ηλεκτρονική παρενόχληση
ηλεκτρονική παρενόχλησηηλεκτρονική παρενόχληση
ηλεκτρονική παρενόχλησηgiaki3
 
connectionpool 事業概要書
connectionpool 事業概要書connectionpool 事業概要書
connectionpool 事業概要書Yu Ito
 
Hadoop > cascading -> cascalog (very short)
Hadoop  > cascading -> cascalog (very short)Hadoop  > cascading -> cascalog (very short)
Hadoop > cascading -> cascalog (very short)Andrew Panfilov
 
01.07 Apresentação evolution AP online
01.07 Apresentação evolution AP online01.07 Apresentação evolution AP online
01.07 Apresentação evolution AP onlinevipessencia
 
Herb as health food
Herb as health foodHerb as health food
Herb as health foodsharmin14
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
Hadoop -> Cascading -> Cascalog
Hadoop -> Cascading -> CascalogHadoop -> Cascading -> Cascalog
Hadoop -> Cascading -> CascalogAndrew Panfilov
 

Viewers also liked (20)

Памятники от простых до элитных г.Оренбург. ..
Памятники от простых до элитных г.Оренбург. ..Памятники от простых до элитных г.Оренбург. ..
Памятники от простых до элитных г.Оренбург. ..
 
Tv print digital differences april 2013
Tv print digital  differences april 2013Tv print digital  differences april 2013
Tv print digital differences april 2013
 
Signals1
Signals1Signals1
Signals1
 
φυλλομετριτες
φυλλομετριτεςφυλλομετριτες
φυλλομετριτες
 
Cloud services From Calsoftlabs
Cloud services From CalsoftlabsCloud services From Calsoftlabs
Cloud services From Calsoftlabs
 
ηλεκτρονική παρενόχληση
ηλεκτρονική παρενόχλησηηλεκτρονική παρενόχληση
ηλεκτρονική παρενόχληση
 
ηλεκτρονική παρενόχληση
ηλεκτρονική παρενόχλησηηλεκτρονική παρενόχληση
ηλεκτρονική παρενόχληση
 
connectionpool 事業概要書
connectionpool 事業概要書connectionpool 事業概要書
connectionpool 事業概要書
 
Wvdial
WvdialWvdial
Wvdial
 
Hadoop > cascading -> cascalog (very short)
Hadoop  > cascading -> cascalog (very short)Hadoop  > cascading -> cascalog (very short)
Hadoop > cascading -> cascalog (very short)
 
Dropwizard
DropwizardDropwizard
Dropwizard
 
The Digital Blind Spot
The Digital Blind SpotThe Digital Blind Spot
The Digital Blind Spot
 
Optimising Video Creative in a Digital World
Optimising Video Creative in a Digital WorldOptimising Video Creative in a Digital World
Optimising Video Creative in a Digital World
 
01.07 Apresentação evolution AP online
01.07 Apresentação evolution AP online01.07 Apresentação evolution AP online
01.07 Apresentação evolution AP online
 
Herb as health food
Herb as health foodHerb as health food
Herb as health food
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Hadoop -> Cascading -> Cascalog
Hadoop -> Cascading -> CascalogHadoop -> Cascading -> Cascalog
Hadoop -> Cascading -> Cascalog
 
Nat
NatNat
Nat
 
EDGE DETECTION
EDGE DETECTIONEDGE DETECTION
EDGE DETECTION
 
Interactive voice-response-system
Interactive voice-response-systemInteractive voice-response-system
Interactive voice-response-system
 

Similar to Auth and association

802.1x authentication
802.1x authentication802.1x authentication
802.1x authenticationXiaoqi Zhao
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
CNG 256 wireless wi-fi and bluetooth
CNG 256 wireless   wi-fi and bluetoothCNG 256 wireless   wi-fi and bluetooth
CNG 256 wireless wi-fi and bluetoothFrank Victory
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdfConfiguring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdfdjameleddine2015
 
presentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdfpresentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdfGumanSingh10
 
Wireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by VijayWireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by Vijaythevijayps
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationSahil Bajaj
 

Similar to Auth and association (20)

Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
802.1x authentication
802.1x authentication802.1x authentication
802.1x authentication
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
CNG 256 wireless wi-fi and bluetooth
CNG 256 wireless   wi-fi and bluetoothCNG 256 wireless   wi-fi and bluetooth
CNG 256 wireless wi-fi and bluetooth
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdfConfiguring Wired 802.1x Authentication on Windows Server 2012.pdf
Configuring Wired 802.1x Authentication on Windows Server 2012.pdf
 
SSL
SSLSSL
SSL
 
presentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdfpresentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdf
 
Wireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by VijayWireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by Vijay
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless security
Wireless securityWireless security
Wireless security
 
The last picks
The last picksThe last picks
The last picks
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
 

More from lyndyv

Datarate
DatarateDatarate
Dataratelyndyv
 
Logging
LoggingLogging
Logginglyndyv
 
Policy
PolicyPolicy
Policylyndyv
 
Capacity
CapacityCapacity
Capacitylyndyv
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Port forward
Port forwardPort forward
Port forwardlyndyv
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilterslyndyv
 
Firewall
FirewallFirewall
Firewalllyndyv
 
Csmaca
CsmacaCsmaca
Csmacalyndyv
 
Basic config
Basic configBasic config
Basic configlyndyv
 
Service set
Service setService set
Service setlyndyv
 
Modulation
ModulationModulation
Modulationlyndyv
 
Wireless components
Wireless componentsWireless components
Wireless componentslyndyv
 

More from lyndyv (14)

Datarate
DatarateDatarate
Datarate
 
Logging
LoggingLogging
Logging
 
Policy
PolicyPolicy
Policy
 
Capacity
CapacityCapacity
Capacity
 
Security standard
Security standardSecurity standard
Security standard
 
Dhcp
DhcpDhcp
Dhcp
 
Port forward
Port forwardPort forward
Port forward
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilters
 
Firewall
FirewallFirewall
Firewall
 
Csmaca
CsmacaCsmaca
Csmaca
 
Basic config
Basic configBasic config
Basic config
 
Service set
Service setService set
Service set
 
Modulation
ModulationModulation
Modulation
 
Wireless components
Wireless componentsWireless components
Wireless components
 

Auth and association

  • 1. Beacons are frames broadcast by the access point to advertise the SSID of the WLAN to wireless clients  Probes are frames used by WLAN clients to find a WLAN network  Authentication and Association is the process for establishing the data link between an access point and a WLAN client
  • 2. The Join Process:  Beacons are broadcast at regular intervals by an access point. Beacons allow a client to discover what WLANS are available in the current location. ◦ It populates the Wireless connection list on a Windows host  Probes are sent by client stations on multiple channels. The probe request contains the SSID of the WLAN the client wants to join and supported bit rates. ◦ A client can send out a probe request with no SSID specified. All access points that receive the probe will respond except those with broadcast SSID disabled.  The access point responds with a probe response that includes the SSID, supported data rates and security standard e.g. WPA2
  • 3. To authenticate the wireless client to the access point  Open authentication (NULL request) ◦ The client device requests authentication to the access point ◦ Four hello packets with NULL verification (no password or keys are provided or expected) exchanged and the access points responds with YES ◦ Open authentication allows the device to start the join process – Choose OPEN to allow WPA and WPA2 security protocols provide strong authentication at a later stage ◦ This is the current default method  Shared key authentication ◦ This method uses a WEP Wired Equivalency Protection key  The client device sends an authentication request to the access point.  The access point sends a challenge back to the client  The client encrypts the challenge with the shared WEP key and sends it back to the access point.  The access point decrypts the encrypted challenge and if it matches the original challenge the access point authenticates the client ◦ WEP was an interim security protocol used while WPA was in development. ◦ Don’t use WEP as it can be broken very quickly
  • 4. Association  The client device scans all channels and listens for beacons and responses to probes  The client device associates to the access point with the strongest signal (if EBSS)  The SSID, MAC address and security settings are sent from the client device to the access point  The access point maps a logical port called the association identifier AID for the WLAN to the clients MAC address (its like a port on a switch) The wireless device has joined the WLAN