Wireless NetWork security
Presenter: Mohammad Rostami
Supervisor: Dr Maghsoud Abbaspour
Shahid Beheshti University
Summer 2020
Introduction
Wireless Security
Wireless Network Threats
Wireless Security Measures
Mobile Device Security
Security Threats
Mobile Device Security Strategy
IEEE 802.11 Wireless LAN Overview
IEEE 802 Protocol Architecture
IEEE 802.11 Network Components and Architectural Model
IEEE 802.11 Services
1
Introduction
2
IEEE 802.11i Wireless LAN Security
IEEE 802.11i Services
IEEE 802.11i Phases of Operation
Discovery Phase
Authentication Phase
Key Management Phase
Protected Data Transfer Phase
Wireless Security
3
Channel
 Mobility
Resources
Accessibility
Wireless Network Threats
4
Accidental association
Malicious association
Ad hoc networks
Nontraditional networks
Wireless Network Threats
5
Identity theft (MAC spoofing)
Man-in-the middle attacks
Denial of service (DoS)
Network injection
Wireless Security Measures
6
 Securing Wireless Transmissions
 Signal-hiding techniques
 Encryption
 Securing Wireless Access Point
Wireless Security Measures
7
 Securing Wireless Networks
 Use encryption
 Use antivirus and antispyware software, and a firewall
 Turn off identifier broadcasting
 Change the identifier on your router from the default
 Change your router’s pre-set password for administration
 Allow only specific computers to access your wireless network
Mobile Device security
8
 Growing use of new devices
 Cloud-based applications
 De-perimeterization
 External business requirements
Mobile Device security
9
 Security Threats
 lack of PhySical Security Controls
 Use of Untrusted Mobile Devices
 Use of Untrusted Networks
 Use of Applications Created by Unknown Parties
Mobile Device security
10
 Security Threats
 Interaction with Other Systems
 Use of Untrusted Content
 Use of Location Services
Mobile Device security
11
 Mobile Device Security Strategy
IEEE 802.11 WireLess Lan Overview
12
IEEE 802 Protocol Architecture
13
IEEE 802 Protocol Architecture
14
 General IEEE 802 MPDU Format
IEEE 802.11 Network Components and
Architectural Model
15
IEEE 802.11 Services
16
 Distribution of Messages Within a DS
 Distribution
 Integration
IEEE 802.11i Wireless lan security
17
 Wired Equivalent Privacy (WEP)
 Wi-Fi Protected Access (WPA)
 Robust Security Network (RSN)
IEEE 802.11i Services
18
 Authentication
 Access control
 Privacy with message integrity
IEEE 802.11i Services
19
IEEE 802.11i Phases of Operation
20
Discovery Phase
21
Authentication Phase
22
 MPDU Exchange
 Connect to AS
 EAP exchange
 Secure key delivery
Key Management Phase
23
 pre-shared key (PSK)
 master session key (MSK)
 pairwise master key (PMK)
 pairwise transient key (PTK)
Key Management Phase
24
Protected Data Transfer Phase
25
 Temporal Key Integrity Protocol
 Message integrity
 Data confidentiality
 Counter Mode-CBC MAC Protocol
 Message integrity
 Data confidentiality

Wireless network security