SlideShare a Scribd company logo
WIRELESS LAN SECURITY 
Technology 
& Wireless LAN Security 
Science Presented By 
of SWAGAT SOURAV Roll # EE 200118189 
Institute Under the guidance of 
National Mr. Siddhartha Bhusan Neelamani 
[1] Swagat Sourav
WIRELESS LAN SECURITY 
Introduction 
[2] National Institute of Science & Technology 
• It is also easy to interfere with wireless communications. A 
simple jamming transmitter can make communications 
impossible. For example, consistently hammering an 
access point with access requests, whether successful or 
not, will eventually exhaust its available radio frequency 
spectrum and knock it off the network. 
• Advantages of WLAN 
• Disadvantages WLAN 
Swagat Sourav
WIRELESS LAN SECURITY 
WLAN Authentication 
[3] National Institute of Science & Technology 
• Wireless LANs, because of their broadcast nature, require the 
addition of: 
User authentication 
Data privacy 
• Authenticating wireless LAN clients. 
Client Authentication Process 
Swagat Sourav
WIRELESS LAN SECURITY 
WLAN Authentication 
Technology 
• Types Of Authentication 
 Open Authentication 
& • The authentication request 
Science • The authentication response 
 Shared Key Authentication 
• requires that the client configure a static WEP key 
of  Service Set Identifier (SSID) 
Institute  MAC Address Authentication 
National [4] • MAC address authentication verifies the client’s MAC 
address against a locally configured list of allowed 
addresses or against an external authentication server 
Swagat Sourav
WIRELESS LAN SECURITY 
WLAN Authentication Vulnerabilities 
• SSID 
[5] National Institute of Science & Technology 
An eavesdropper can easily determine the SSID with the use of an 
802.11 wireless LAN packet analyzer, like Sniffer Pro. 
• Open Authentication 
Open authentication provides no way for the access point to 
determine whether a client is valid. 
• Shared Key Authentication Vulnerabilities 
The process of exchanging the challenge text occurs over the 
wireless link and is vulnerable to a man-in-the-middle attack 
• MAC Address Authentication Vulnerabilities 
A protocol analyzer can be used to determine a valid MAC 
Swagat Sourav 
address
WIRELESS LAN SECURITY 
WEP Encryption 
[6] National Institute of Science & Technology 
• WEP is based on the RC4 algorithm, which is a symmetric 
key stream cipher. The encryption keys must match on both 
the client and the access point for frame exchanges to succeed 
 Stream Ciphers 
Encrypts data by generating a key stream from the key and 
performing the XOR function on the key stream with the plain-text 
data 
Swagat Sourav
WIRELESS LAN SECURITY 
WEP Encryption 
[7] National Institute of Science & Technology 
Swagat Sourav 
 Block Ciphers 
Fragments the frame into blocks of predetermined size and performs 
the XOR function on each block.
WIRELESS LAN SECURITY 
WEP Encryption Weaknesses 
[8] National Institute of Science & Technology 
• There are two encryption techniques to overcome WEP 
encryption weakness 
Initialization vectors 
Feedback modes 
• Initialization vectors 
Swagat Sourav
WIRELESS LAN SECURITY 
WEP Encryption Weaknesses 
• Feedback Modes 
[9] National Institute of Science & Technology 
Swagat Sourav
WIRELESS LAN SECURITY 
WEP Encryption Weaknesses 
Technology 
• Statistical Key Derivation—Passive Network Attacks 
& Science of Institute National [10] A WEP key could be derived by passively collecting particular frames 
from a wireless LAN 
• Inductive Key Derivation—Active Network Attacks 
Inductive key derivation is the process of deriving a key by coercing 
information from the wireless LAN 
 Initialization Vector Replay Attacks 
 Bit-Flipping Attacks 
• Static WEP Key Management Issues 
Swagat Sourav
WIRELESS LAN SECURITY 
Component of WLAN Security 
Technology 
• The Authentication Framework (802.1X) 
• The EAP Authentication Algorithm 
& Science  Mutual Authentication 
 User-Based Authentication 
 Dynamic WEP Keys 
of Institute • Data Privacy with TKIP (Temporal Key Integrity Protocol ) 
 A message integrity check (MIC 
 Per-packet keying 
National  Broadcast Key Rotation 
[11] Swagat Sourav
WIRELESS LAN SECURITY 
Future of WLAN Security 
Technology 
• AES (Advanced Encryption Standard ) 
 AES-OCB Mode 
& Science of Institute National [12] Swagat Sourav
WIRELESS LAN SECURITY 
Future of WLAN Security 
[13] National Institute of Science & Technology 
Swagat Sourav 
 AES-CCM Mode
WIRELESS LAN SECURITY 
Conclusion 
Technology 
Wireless LAN deployments should be made as secure 
as possible. Standard 802.11 security is weak and 
vulnerable to numerous network attacks. This paper has 
& highlighted these vulnerabilities and described how it 
Science can be solved to create secure wireless LANs. 
Some security enhancement features might not be 
of deployable in some situations because of device 
Institute limitations such as application specific devices (ASDs 
such as 802.11 phones capable of static WEP only) or 
mixed vendor environments. In such cases, it is 
National important that the network administrator understand the 
potential WLAN security vulnerabilities. 
[14] Swagat Sourav
WIRELESS LAN SECURITY 
Technology 
& Science Thank 
of Institute You!!! 
National [15] Swagat Sourav

More Related Content

What's hot

Networking Technologies
Networking TechnologiesNetworking Technologies
Networking Technologies
H.R.Supun Harshana
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular NetworksYoram Orzach
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
rjain51
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
home
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
Umme habiba
 
Gsm call routing
Gsm call routingGsm call routing
Gsm call routing
Ramakrishna Pulikonda
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
OECLIB Odisha Electronics Control Library
 
Cellular technologies and security
Cellular technologies and securityCellular technologies and security
Cellular technologies and security
undergraduate
 
Wireless network
Wireless networkWireless network
Wireless network
mattglover0
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
Abu Rayhan Ahmmed Rimu
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
HasanMaster
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
AJAL A J
 
Cellular Telephone Systems
Cellular Telephone SystemsCellular Telephone Systems
Cellular Telephone Systems
Shantanu Krishna
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
Vinay Krishna
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 
Presentation on CDMA
Presentation on CDMAPresentation on CDMA
Presentation on CDMA
Shuvangkar Dhar
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
Bhushan Jadhav
 

What's hot (20)

Networking Technologies
Networking TechnologiesNetworking Technologies
Networking Technologies
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular Networks
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
Gsm call routing
Gsm call routingGsm call routing
Gsm call routing
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Cellular technologies and security
Cellular technologies and securityCellular technologies and security
Cellular technologies and security
 
Wireless network
Wireless networkWireless network
Wireless network
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
Wi fi
Wi fiWi fi
Wi fi
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
Cellular Telephone Systems
Cellular Telephone SystemsCellular Telephone Systems
Cellular Telephone Systems
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
Presentation on CDMA
Presentation on CDMAPresentation on CDMA
Presentation on CDMA
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 

Viewers also liked

802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 
WLAN
WLANWLAN
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Shreejan Acharya
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
Dilum Bandara
 
Wlan security
Wlan securityWlan security
Wlan security
Sajan Sahu
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
Irsandi Hasan
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
Vuz Dở Hơi
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
SUBBIAH SURESH
 

Viewers also liked (11)

802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
WLAN
WLANWLAN
WLAN
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wlan
WlanWlan
Wlan
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 

Similar to Wireless lan

Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
Saumya Ranjan Behura
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
Fathima Rahaman
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
cmstiernberg
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
Sreekanth GS
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
guestd7b627
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
Arpit Bhatia
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
Marcus Dempsey
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
Atika Zaimi
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
Zaibi Gondal
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Shital Kat
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
PREMKUMAR
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
cmstiernberg
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
abenimelos
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
NotSure11
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
Mavaz
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
Altaware, Inc.
 

Similar to Wireless lan (20)

Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Wifi
WifiWifi
Wifi
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
 
Wireless Security.ppt
Wireless Security.pptWireless Security.ppt
Wireless Security.ppt
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 

More from Sajan Sahu

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
Sajan Sahu
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoy
Sajan Sahu
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
Sajan Sahu
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
Sajan Sahu
 
Data compretion
Data compretionData compretion
Data compretion
Sajan Sahu
 
Deadlock
DeadlockDeadlock
Deadlock
Sajan Sahu
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
Sajan Sahu
 
Information system
Information systemInformation system
Information system
Sajan Sahu
 
Dna computing
Dna computingDna computing
Dna computing
Sajan Sahu
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
Sajan Sahu
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
Sajan Sahu
 
Database system
Database systemDatabase system
Database system
Sajan Sahu
 
GPRS
GPRSGPRS
Bios
BiosBios
Bluetooth
Bluetooth Bluetooth
Bluetooth
Sajan Sahu
 
802.11
802.11802.11
802.11
Sajan Sahu
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
Sajan Sahu
 
Wcdma
WcdmaWcdma
Wcdma
Sajan Sahu
 
Criptography
CriptographyCriptography
Criptography
Sajan Sahu
 

More from Sajan Sahu (20)

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
 
Insurance envoy
Insurance envoyInsurance envoy
Insurance envoy
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
 
Data compretion
Data compretionData compretion
Data compretion
 
Deadlock
DeadlockDeadlock
Deadlock
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
 
Information system
Information systemInformation system
Information system
 
Dna computing
Dna computingDna computing
Dna computing
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
 
Database system
Database systemDatabase system
Database system
 
GPRS
GPRSGPRS
GPRS
 
Bios
BiosBios
Bios
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
802.11
802.11802.11
802.11
 
Erp
ErpErp
Erp
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Wcdma
WcdmaWcdma
Wcdma
 
Criptography
CriptographyCriptography
Criptography
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Wireless lan

  • 1. WIRELESS LAN SECURITY Technology & Wireless LAN Security Science Presented By of SWAGAT SOURAV Roll # EE 200118189 Institute Under the guidance of National Mr. Siddhartha Bhusan Neelamani [1] Swagat Sourav
  • 2. WIRELESS LAN SECURITY Introduction [2] National Institute of Science & Technology • It is also easy to interfere with wireless communications. A simple jamming transmitter can make communications impossible. For example, consistently hammering an access point with access requests, whether successful or not, will eventually exhaust its available radio frequency spectrum and knock it off the network. • Advantages of WLAN • Disadvantages WLAN Swagat Sourav
  • 3. WIRELESS LAN SECURITY WLAN Authentication [3] National Institute of Science & Technology • Wireless LANs, because of their broadcast nature, require the addition of: User authentication Data privacy • Authenticating wireless LAN clients. Client Authentication Process Swagat Sourav
  • 4. WIRELESS LAN SECURITY WLAN Authentication Technology • Types Of Authentication  Open Authentication & • The authentication request Science • The authentication response  Shared Key Authentication • requires that the client configure a static WEP key of  Service Set Identifier (SSID) Institute  MAC Address Authentication National [4] • MAC address authentication verifies the client’s MAC address against a locally configured list of allowed addresses or against an external authentication server Swagat Sourav
  • 5. WIRELESS LAN SECURITY WLAN Authentication Vulnerabilities • SSID [5] National Institute of Science & Technology An eavesdropper can easily determine the SSID with the use of an 802.11 wireless LAN packet analyzer, like Sniffer Pro. • Open Authentication Open authentication provides no way for the access point to determine whether a client is valid. • Shared Key Authentication Vulnerabilities The process of exchanging the challenge text occurs over the wireless link and is vulnerable to a man-in-the-middle attack • MAC Address Authentication Vulnerabilities A protocol analyzer can be used to determine a valid MAC Swagat Sourav address
  • 6. WIRELESS LAN SECURITY WEP Encryption [6] National Institute of Science & Technology • WEP is based on the RC4 algorithm, which is a symmetric key stream cipher. The encryption keys must match on both the client and the access point for frame exchanges to succeed  Stream Ciphers Encrypts data by generating a key stream from the key and performing the XOR function on the key stream with the plain-text data Swagat Sourav
  • 7. WIRELESS LAN SECURITY WEP Encryption [7] National Institute of Science & Technology Swagat Sourav  Block Ciphers Fragments the frame into blocks of predetermined size and performs the XOR function on each block.
  • 8. WIRELESS LAN SECURITY WEP Encryption Weaknesses [8] National Institute of Science & Technology • There are two encryption techniques to overcome WEP encryption weakness Initialization vectors Feedback modes • Initialization vectors Swagat Sourav
  • 9. WIRELESS LAN SECURITY WEP Encryption Weaknesses • Feedback Modes [9] National Institute of Science & Technology Swagat Sourav
  • 10. WIRELESS LAN SECURITY WEP Encryption Weaknesses Technology • Statistical Key Derivation—Passive Network Attacks & Science of Institute National [10] A WEP key could be derived by passively collecting particular frames from a wireless LAN • Inductive Key Derivation—Active Network Attacks Inductive key derivation is the process of deriving a key by coercing information from the wireless LAN  Initialization Vector Replay Attacks  Bit-Flipping Attacks • Static WEP Key Management Issues Swagat Sourav
  • 11. WIRELESS LAN SECURITY Component of WLAN Security Technology • The Authentication Framework (802.1X) • The EAP Authentication Algorithm & Science  Mutual Authentication  User-Based Authentication  Dynamic WEP Keys of Institute • Data Privacy with TKIP (Temporal Key Integrity Protocol )  A message integrity check (MIC  Per-packet keying National  Broadcast Key Rotation [11] Swagat Sourav
  • 12. WIRELESS LAN SECURITY Future of WLAN Security Technology • AES (Advanced Encryption Standard )  AES-OCB Mode & Science of Institute National [12] Swagat Sourav
  • 13. WIRELESS LAN SECURITY Future of WLAN Security [13] National Institute of Science & Technology Swagat Sourav  AES-CCM Mode
  • 14. WIRELESS LAN SECURITY Conclusion Technology Wireless LAN deployments should be made as secure as possible. Standard 802.11 security is weak and vulnerable to numerous network attacks. This paper has & highlighted these vulnerabilities and described how it Science can be solved to create secure wireless LANs. Some security enhancement features might not be of deployable in some situations because of device Institute limitations such as application specific devices (ASDs such as 802.11 phones capable of static WEP only) or mixed vendor environments. In such cases, it is National important that the network administrator understand the potential WLAN security vulnerabilities. [14] Swagat Sourav
  • 15. WIRELESS LAN SECURITY Technology & Science Thank of Institute You!!! National [15] Swagat Sourav