SlideShare a Scribd company logo
WEL-COME
Presented by:
Vinay. V. Chitrakathi
T.E. (C.S.E.)
Wireless Security: Risks and Solutions
Presented to:
Prof. A. D. Pathak
Seminar Guide
 Overview of Wireless Technology.
 Security and Privacy issues in Wireless Network.
 Wireless Security Protocols.
 Wireless Equivalent Privacy (WEP).
 Wireless Equivalent Privacy (WEP2).
 Wi-Fi Protected Access (WPA).
 Temporal Key Integrity Protocol (TKIP).
 WPA Pre Shared Key (WPA-PSK).
 Wi-Fi Protected Access (WPA2).
 Counter-Mode with CBC-MAC Protocol (CCMP).
 Wireless Network Threats.
 Traffic Analysis.
 Passive Eavesdropping.
 Active Eavesdropping.
 Unauthorized Access.
 Man-in-the-middle
 Session High-Jacking
 Replay
 Denial of service (DoS)
Contents
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service
names are the property of their respective owners. © Motorola, Inc. 2010. All rights reserved.
5
INTERNET
Server
Network Edge
Blurred
New Attack
Vectors ‘Behind’
the Firewall
WIRELESS SECURITY
CONCERNS
1 Rogue AP
Connected to Network
(Network Breach)
Hacker
3 Leaked Wired
Traffic & Insertion
(Data Leakage)
Hotspot Evil Twin
Mobile User2
Hotspot Phishing
(Data Leakage)
5 Users Bypassing Network
Security Controls
(Data Leakage/Network Backdoor)
4
Non-Compliant AP
(Network Breach/Data Leakage/
Data Compromise)
Muni Wi-Fi or Neighbors
The wireless networks are based on the IEEE
standards belonging to the 802 family.
 Following list is a simple overview of the 802.11
family:
• 802.11b
o Most widespread
o 11Mb maximum, 2.4 GHZ band
• 802.11a
o Next generation
o 54MB maximum, 5GHZ band
• 802.11g
o 54MB maximum, 2.4 GHZ band
o Compatible with 802.11b
• 802.11X
o Uses Extensible Authentication Protocol (EAP)
o Supports RADIUS
• 802.11i
OVERVIEW OF WIRELESS TECHNOLOGY.
NEED OF WIRELESS SECURITY
 Prevention of unauthorized access or damage to computers
using wireless networks.
 Guard against unauthorized access to important resources.
 Protection from attacks on:
 Confidentiality: The protection of data from
unauthorized disclosure.
 Integrity: The assurance that data received are exactly
as sent by an authorized entity.
 Availability: Authorized users have reliable and timely
access to information.
7
Wireless Equivalent Privacy (WEP)
 WEP algorithm is used to protect wireless
communication from eavesdropping and to
prevent unauthorized access to a wireless
network.
 The original implementations of WEP supported
so-called 40-bit encryption, having a key of
length 40 bits and 24 additional bits of system-
generated data (64 bits total).
 40-bit WEP encryption is too easy to decode.
 128-bit encryption (key length of 104 bits, not
128 bits).
 WEP relies on a secret key.
 WEP uses the RC4 encryption algorithm, which is
known as a stream cipher.
 stream cipher operates by expanding a short key
into an infinite pseudo-random key stream.
Wireless Equivalent Privacy (WEP)
(Cont.)
WPA (Wi-Fi Protected Access)
 It is also known as WEP+.
 WEP+ enhances WEP security by avoiding "weak
IVs“.
 It is only completely effective when WEP+ is used
at both ends of the wireless connection.
 WPA use Temporal Key Integrity Protocol (TKIP) to
addresses the encryption weaknesses of WEP.
 Key component of WPA is built-in authentication
that WEP does not offer.
WPA (Wi-Fi Protected Access) (Cont.)
 One variation of WPA is called WPA Pre Shared
Key or WPA-PSK.
 By using TKIP, WPA-PSK automatically changes
the keys at a preset time interval, making it
much more difficult for hackers to find and
exploit them.
 WPA uses the RC4 cipher.
 Keys are rotated frequently, and the packet
counter prevents packet replay or packet re-
injection attacks.
WPA2 (Wi-Fi Protected Access)
 WPA2 (Wi-Fi Protected Access 2) gives wireless
networks both confidentiality and data
integrity.
 The Layer 2-based WPA2 better protects the
network.
 WPA2 uses a new encryption method called
CCMP (Counter-Mode with CBC-MAC Protocol).
 CCMP is based on Advanced Encryption
Standard (AES).
 AES is stronger algorithm then RC4.
Wireless Network Threats
 Traffic Analysis.
 Passive Eavesdropping.
 Active Eavesdropping.
 Unauthorized Access.
 Man-in-the-middle
 Session High-Jacking
 Denial of service (DoS)
Traffic Analysis
 Traffic analysis allows the attacker to
obtain three forms of information.
 The attacker preliminary identify that
there is activity on the network.
 The identification and Physical location of
the Wireless Access Point (AP).
 The type of protocol being used during the
transmission.
Passive Eavesdropping
Attacker
Target
 Passive Eavesdropping allows the attacker to obtain two
forms of information.
 The attacker can read the data transmitted in the session.
 The attacker can read the information i.e. source,
destination, size, number and time of transmission.
Active Eavesdropping
 Active Eavesdropping allows the attacker inject the data
into the communication to decipher the payload.
 Active Eavesdropping can take into two forms.
 The attacker can modify the packet.
 The attacker can inject complete packet into the
data.
 The WEP by using CRC only check the integrity of the
data into the packet.
Unauthorized Access
 Due to physical properties of the WLAN, the
attacker will always have access to the
Wireless components of the network.
 If attacker become successful to get
unauthorized access to the network by using
brute force attack, man in the middle and
denial of service attack, attacker can enjoy
the whole network services.
Man-in-the-Middle
Session Hi-Jacking
 Changing Administrator Passwords and Usernames
 Upgrading your Wi-fi Encryption
 Changing the Default System ID
 MAC Address Filtering
 Stop Publicly Broadcasting your Network
 Auto-Connect to Open Wi-fi Networks?
 You've got a built-in firewall, so use it
 Positioning of the Router or Access Point
 When to Turn Off the Network
Wireless security

More Related Content

What's hot

Wireless network security
Wireless network securityWireless network security
Wireless network security
Shahid Beheshti University
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
Fathima Rahaman
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
poonamjindal6
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
Virendra Thakur
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
yousef emami
 
Wlan security
Wlan securityWlan security
Wlan security
Sajan Sahu
 
802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
Martyn Price
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
Nzava Luwawa
 
WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
Huda Seyam
 
Wired equivalent privacy (wep)
Wired equivalent privacy (wep)Wired equivalent privacy (wep)
Wired equivalent privacy (wep)
akruthi k
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocolsguestfbf635
 
Wired equivalent privacy by SecArmour
 Wired equivalent privacy by SecArmour Wired equivalent privacy by SecArmour
Wired equivalent privacy by SecArmour
Sec Armour
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
SAHEEL FAL DESAI
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networks
Maghan Das
 
Security attacks
Security attacksSecurity attacks
Security attacks
Tejaswi Potluri
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
rajakhurram
 

What's hot (20)

Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
WEP
WEPWEP
WEP
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Wlan security
Wlan securityWlan security
Wlan security
 
802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
 
Wired equivalent privacy (wep)
Wired equivalent privacy (wep)Wired equivalent privacy (wep)
Wired equivalent privacy (wep)
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
 
Wired equivalent privacy by SecArmour
 Wired equivalent privacy by SecArmour Wired equivalent privacy by SecArmour
Wired equivalent privacy by SecArmour
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Cracking wep and wpa wireless networks
Cracking wep and wpa wireless networksCracking wep and wpa wireless networks
Cracking wep and wpa wireless networks
 
Security attacks
Security attacksSecurity attacks
Security attacks
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 

Similar to Wireless security

Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
Adel Zalok
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
Sreekanth GS
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
guestd7b627
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
Shivam Singh
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Shital Kat
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
pijans
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
Briskinfosec Technology and Consulting
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
nikshaikh786
 
Wireless Security (1).ppt
Wireless Security (1).pptWireless Security (1).ppt
Wireless Security (1).ppt
EvaBlessed
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
Nitesh Dubey
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
OWASP Delhi
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
Chandrak Trivedi
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
abenimelos
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
Mandeep Jadon
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Dr. Amarjeet Singh
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
IRJET Journal
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
siDz
 

Similar to Wireless security (20)

Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Wireless Security (1).ppt
Wireless Security (1).pptWireless Security (1).ppt
Wireless Security (1).ppt
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 

Recently uploaded

Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 

Recently uploaded (20)

Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 

Wireless security

  • 2.
  • 3. Presented by: Vinay. V. Chitrakathi T.E. (C.S.E.) Wireless Security: Risks and Solutions Presented to: Prof. A. D. Pathak Seminar Guide
  • 4.  Overview of Wireless Technology.  Security and Privacy issues in Wireless Network.  Wireless Security Protocols.  Wireless Equivalent Privacy (WEP).  Wireless Equivalent Privacy (WEP2).  Wi-Fi Protected Access (WPA).  Temporal Key Integrity Protocol (TKIP).  WPA Pre Shared Key (WPA-PSK).  Wi-Fi Protected Access (WPA2).  Counter-Mode with CBC-MAC Protocol (CCMP).  Wireless Network Threats.  Traffic Analysis.  Passive Eavesdropping.  Active Eavesdropping.  Unauthorized Access.  Man-in-the-middle  Session High-Jacking  Replay  Denial of service (DoS) Contents
  • 5. MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. © Motorola, Inc. 2010. All rights reserved. 5 INTERNET Server Network Edge Blurred New Attack Vectors ‘Behind’ the Firewall WIRELESS SECURITY CONCERNS 1 Rogue AP Connected to Network (Network Breach) Hacker 3 Leaked Wired Traffic & Insertion (Data Leakage) Hotspot Evil Twin Mobile User2 Hotspot Phishing (Data Leakage) 5 Users Bypassing Network Security Controls (Data Leakage/Network Backdoor) 4 Non-Compliant AP (Network Breach/Data Leakage/ Data Compromise) Muni Wi-Fi or Neighbors
  • 6. The wireless networks are based on the IEEE standards belonging to the 802 family.  Following list is a simple overview of the 802.11 family: • 802.11b o Most widespread o 11Mb maximum, 2.4 GHZ band • 802.11a o Next generation o 54MB maximum, 5GHZ band • 802.11g o 54MB maximum, 2.4 GHZ band o Compatible with 802.11b • 802.11X o Uses Extensible Authentication Protocol (EAP) o Supports RADIUS • 802.11i OVERVIEW OF WIRELESS TECHNOLOGY.
  • 7. NEED OF WIRELESS SECURITY  Prevention of unauthorized access or damage to computers using wireless networks.  Guard against unauthorized access to important resources.  Protection from attacks on:  Confidentiality: The protection of data from unauthorized disclosure.  Integrity: The assurance that data received are exactly as sent by an authorized entity.  Availability: Authorized users have reliable and timely access to information. 7
  • 8. Wireless Equivalent Privacy (WEP)  WEP algorithm is used to protect wireless communication from eavesdropping and to prevent unauthorized access to a wireless network.  The original implementations of WEP supported so-called 40-bit encryption, having a key of length 40 bits and 24 additional bits of system- generated data (64 bits total).  40-bit WEP encryption is too easy to decode.
  • 9.  128-bit encryption (key length of 104 bits, not 128 bits).  WEP relies on a secret key.  WEP uses the RC4 encryption algorithm, which is known as a stream cipher.  stream cipher operates by expanding a short key into an infinite pseudo-random key stream. Wireless Equivalent Privacy (WEP) (Cont.)
  • 10. WPA (Wi-Fi Protected Access)  It is also known as WEP+.  WEP+ enhances WEP security by avoiding "weak IVs“.  It is only completely effective when WEP+ is used at both ends of the wireless connection.  WPA use Temporal Key Integrity Protocol (TKIP) to addresses the encryption weaknesses of WEP.  Key component of WPA is built-in authentication that WEP does not offer.
  • 11. WPA (Wi-Fi Protected Access) (Cont.)  One variation of WPA is called WPA Pre Shared Key or WPA-PSK.  By using TKIP, WPA-PSK automatically changes the keys at a preset time interval, making it much more difficult for hackers to find and exploit them.  WPA uses the RC4 cipher.  Keys are rotated frequently, and the packet counter prevents packet replay or packet re- injection attacks.
  • 12. WPA2 (Wi-Fi Protected Access)  WPA2 (Wi-Fi Protected Access 2) gives wireless networks both confidentiality and data integrity.  The Layer 2-based WPA2 better protects the network.  WPA2 uses a new encryption method called CCMP (Counter-Mode with CBC-MAC Protocol).  CCMP is based on Advanced Encryption Standard (AES).  AES is stronger algorithm then RC4.
  • 13. Wireless Network Threats  Traffic Analysis.  Passive Eavesdropping.  Active Eavesdropping.  Unauthorized Access.  Man-in-the-middle  Session High-Jacking  Denial of service (DoS)
  • 14. Traffic Analysis  Traffic analysis allows the attacker to obtain three forms of information.  The attacker preliminary identify that there is activity on the network.  The identification and Physical location of the Wireless Access Point (AP).  The type of protocol being used during the transmission.
  • 15. Passive Eavesdropping Attacker Target  Passive Eavesdropping allows the attacker to obtain two forms of information.  The attacker can read the data transmitted in the session.  The attacker can read the information i.e. source, destination, size, number and time of transmission.
  • 16. Active Eavesdropping  Active Eavesdropping allows the attacker inject the data into the communication to decipher the payload.  Active Eavesdropping can take into two forms.  The attacker can modify the packet.  The attacker can inject complete packet into the data.  The WEP by using CRC only check the integrity of the data into the packet.
  • 17. Unauthorized Access  Due to physical properties of the WLAN, the attacker will always have access to the Wireless components of the network.  If attacker become successful to get unauthorized access to the network by using brute force attack, man in the middle and denial of service attack, attacker can enjoy the whole network services.
  • 20.  Changing Administrator Passwords and Usernames  Upgrading your Wi-fi Encryption  Changing the Default System ID  MAC Address Filtering  Stop Publicly Broadcasting your Network  Auto-Connect to Open Wi-fi Networks?  You've got a built-in firewall, so use it  Positioning of the Router or Access Point  When to Turn Off the Network