SlideShare uma empresa Scribd logo
1 de 29
WIRELESS NETWORK
SECURITY
Presented by
Dr. G. Fathima
Prof & Head
Dept. of CSE
Adhiyamaan College of Engineering,
Hosur
AGENDA
• Security Requirements
• Wireless Network Threats
• Wireless Security Measures
• Wireless LAN Security
Security Requirements
• Authentication
• Confidentiality
• Integrity
• Non-repudiation
• Availability
• Detection and Isolation
Security Requirements
• Authentication: A node must know the
identity of the peer node it is
communicating with.
• Confidentiality: Ensures certain
information is never disclosed to
unauthorized entities.
• Integrity: Message being transmitted is
never corrupted.
Contd..
• Non-Repudiation: The sender cannot later
deny sending the information and the
receiver cannot deny the reception.
• Availability: Nodes should be available for
communication at all times. A node need
continue to provide services despite attacks.
• Detection and Isolation: Require the protocol
can identify misbehaving nodes and render
them unable to interfere with routing.
WIRELESS NETWORKS
• # wireless (mobile) phone subscribers now
exceeds # wired phone subscribers (5-to-1)!
• # wireless Internet-connected devices equals
# wireline Internet-connected devices
– laptops, Internet-enabled phones promise anytime
untethered Internet access
• two important (but different) challenges
– wireless: communication over wireless link
– mobility: handling the mobile user who changes
point of attachment to network
WIRELESS DEMAND
• Wireless nodes will soon dominate the
Internet.
• Currently ~1B nodes, including wireline.
infrastructure mode
 base station connects
mobiles into wired
network
 handoff: mobile
changes base station
due to device mobility
Elements of a wireless network
network
infrastructure
ad hoc mode
 no base stations
 nodes can only
transmit to other
nodes within link
coverage
 nodes organize
themselves into a
network: route
among themselves
Elements of a wireless network
Wireless Security Overview
• concerns for wireless security are similar
to those found in a wired environment
• security requirements are the same:
confidentiality, integrity, availability,
authenticity, accountability
• most significant source of risk is the
underlying communications medium
Wireless Networks Security –
Key Factors
• Key factors contributing to higher security risk of wireless
networks compared to wired networks include:
–Channel
• Wireless networking typically involves
broadcast communications, which is far
more susceptible to eavesdropping and
jamming than wired networks
–Mobility
• Wireless devices are far more portable
and mobile, thus resulting in a number
of risks
Wireless Networks Security –
Key Factors
– Resources
• Some wireless devices, such as smartphones and
tablets, have sophisticated operating systems but
limited memory and processing resources with which
to counter threats, including denial of service and
malware
– Accessibility
• Some wireless devices, such as sensors and robots,
may be left unattended in remote and/or hostile
locations, thus greatly increasing their vulnerability
to physical attacks
Wireless Network Threats
accidental
association
malicious
association
ad hoc
networks
nontraditional
networks
identity theft
(MAC
spoofing)
man-in-the
middle attacks
denial of
service (DoS)
network
injection
Wireless Security Techniques
use encryption
use anti-virus and
anti-spyware
software and a
firewall
turn off identifier
broadcasting
change the
identifier on your
router from the
default
change your
router’s pre-set
password for
administration
allow only specific
computers to
access your
wireless network
Securing Wireless Access Points
• main threat involving wireless access points is
unauthorized access to the network
• principal approach for preventing such access is
the IEEE 802.1X standard for port-based network
access control
– provides an authentication mechanism for
devices wishing to attach to a LAN or wireless
network
• use of 802.1X can prevent rogue access points and
other unauthorized devices from becoming
insecure backdoors
Securing Wireless Transmissions
countermeasures for eavesdropping:
signal-hiding techniques
• turning off service set identifier (SSID) broadcasted by wireless
access points;
• assigning cryptic names to SSIDs
• reducing signal strength to the lowest level that still provides
requisite coverage;
• use of directional antennas and of signal-shielding techniques.
encryption
• the use of encryption and authentication protocols is the standard
method of countering attempts to alter or insert transmissions
• Cryptographic algorithms
Wireless LAN
• IEEE 802 committee for LAN standards formed
new working group for Wireless LAN
• IEEE 802.11 formed in 1990’s
– charter to develop a protocol & transmission
specifications for wireless LANs (WLANs)
• since then demand for WLANs, at different
frequencies and data rates, has exploded, ever-
expanding list of standards has been issued
Wireless Fidelity (Wi-Fi) Alliance
• 802.11b
– first 802.11 standard to gain broad industry
acceptance
• Wireless Ethernet Compatibility Alliance
(WECA)
– industry consortium formed in 1999 to address the
concern of products from different vendors
successfully interoperating
– later renamed the Wi-Fi Alliance
• created a test suite to certify interoperability
• Certification was initially for 802.11b, later
extended to 802.11g
• Certified 802.11b products are called as Wi-Fi
IEEE 802 Protocol Architecture
IEEE 802.11 Network Components
IEEE 802.11 Terminology
802.11 Wireless LAN Security
• original 802.11 spec had security features
• Wired Equivalent Privacy (WEP) algorithm
• but found this contained major weaknesses
– 802.11i task group developed capabilities to address
WLAN security issues
– Wi-Fi Alliance developed certification procedures for
IEEEE 802.11 security standards called as Wi-Fi
Protected Access (WPA)
– final form 802.11i standard -Robust Security Network
(RSN)
– Recent version of WPA is WPA2 – incorporates all
security features of IEEE802.11i WLAN security
specification
IEEE 802.11 Services
802.11i RSN Services and Protocols
TKIP – Temporal Key Integrity Protocol
CCMP – Counter Mode with Cipher Block Chaining MAC
Protocol
802.11i RSN Cryptographic Algorithms
802.11i Phases of Operation
Phases of Operation
• Discovery: An AP uses messages called Beacons and
Probe Responses to advertise its IEEE 802.11i security
policy. The STA uses these to identify an AP for a WLAN
with which it wishes to communicate. The STA associates
with the AP, which it uses to select the cipher suite and
authentication mechanism when the Beacons and Probe
Responses present a choice.
• Authentication: During this phase, the STA and AS
prove their identities to each other. The AP blocks non-
authentication traffic between the STA and AS until the
authentication transaction is successful. The AP does not
participate in the authentication transaction other than
forwarding traffic between the STA and AS.
•
Phases of Operation
• Key generation and distribution: The AP and the STA
perform several operations that cause cryptographic keys to
be generated and placed on the AP and the STA. Frames are
exchanged between the AP and STA only
• Protected data transfer: Frames are exchanged
between the STA and the end station through the AP. As
denoted by the shading and the encryption module icon,
secure data transfer occurs between the STA and the AP
only; security is not provided end-to-end.
• Connection termination: The AP and STA exchange
frames. During this phase, the secure connection is torn
down and the connection is restored to the original state.
?
Thank You

Mais conteúdo relacionado

Mais procurados

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurationsStudent
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 

Mais procurados (20)

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Network security
Network securityNetwork security
Network security
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Wlan security
Wlan securityWlan security
Wlan security
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Network security
Network security Network security
Network security
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
IP Security
IP SecurityIP Security
IP Security
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 

Semelhante a Wireless Network security

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 
Network Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecurityNetwork Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecuritySUBHAK25
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan finalPREMKUMAR
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applicationscmstiernberg
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologiesInocentshuja Ahmad
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringeceb9198
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelesskratos2424
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.pptAbyThomas54
 

Semelhante a Wireless Network security (20)

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Network Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless SecurityNetwork Security- Basics Knowledge in wireless Security
Network Security- Basics Knowledge in wireless Security
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.ppt
 

Último

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Wireless Network security

  • 1. WIRELESS NETWORK SECURITY Presented by Dr. G. Fathima Prof & Head Dept. of CSE Adhiyamaan College of Engineering, Hosur
  • 2. AGENDA • Security Requirements • Wireless Network Threats • Wireless Security Measures • Wireless LAN Security
  • 3. Security Requirements • Authentication • Confidentiality • Integrity • Non-repudiation • Availability • Detection and Isolation
  • 4. Security Requirements • Authentication: A node must know the identity of the peer node it is communicating with. • Confidentiality: Ensures certain information is never disclosed to unauthorized entities. • Integrity: Message being transmitted is never corrupted.
  • 5. Contd.. • Non-Repudiation: The sender cannot later deny sending the information and the receiver cannot deny the reception. • Availability: Nodes should be available for communication at all times. A node need continue to provide services despite attacks. • Detection and Isolation: Require the protocol can identify misbehaving nodes and render them unable to interfere with routing.
  • 6. WIRELESS NETWORKS • # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! • # wireless Internet-connected devices equals # wireline Internet-connected devices – laptops, Internet-enabled phones promise anytime untethered Internet access • two important (but different) challenges – wireless: communication over wireless link – mobility: handling the mobile user who changes point of attachment to network
  • 7. WIRELESS DEMAND • Wireless nodes will soon dominate the Internet. • Currently ~1B nodes, including wireline.
  • 8. infrastructure mode  base station connects mobiles into wired network  handoff: mobile changes base station due to device mobility Elements of a wireless network network infrastructure
  • 9. ad hoc mode  no base stations  nodes can only transmit to other nodes within link coverage  nodes organize themselves into a network: route among themselves Elements of a wireless network
  • 10. Wireless Security Overview • concerns for wireless security are similar to those found in a wired environment • security requirements are the same: confidentiality, integrity, availability, authenticity, accountability • most significant source of risk is the underlying communications medium
  • 11. Wireless Networks Security – Key Factors • Key factors contributing to higher security risk of wireless networks compared to wired networks include: –Channel • Wireless networking typically involves broadcast communications, which is far more susceptible to eavesdropping and jamming than wired networks –Mobility • Wireless devices are far more portable and mobile, thus resulting in a number of risks
  • 12. Wireless Networks Security – Key Factors – Resources • Some wireless devices, such as smartphones and tablets, have sophisticated operating systems but limited memory and processing resources with which to counter threats, including denial of service and malware – Accessibility • Some wireless devices, such as sensors and robots, may be left unattended in remote and/or hostile locations, thus greatly increasing their vulnerability to physical attacks
  • 13. Wireless Network Threats accidental association malicious association ad hoc networks nontraditional networks identity theft (MAC spoofing) man-in-the middle attacks denial of service (DoS) network injection
  • 14. Wireless Security Techniques use encryption use anti-virus and anti-spyware software and a firewall turn off identifier broadcasting change the identifier on your router from the default change your router’s pre-set password for administration allow only specific computers to access your wireless network
  • 15. Securing Wireless Access Points • main threat involving wireless access points is unauthorized access to the network • principal approach for preventing such access is the IEEE 802.1X standard for port-based network access control – provides an authentication mechanism for devices wishing to attach to a LAN or wireless network • use of 802.1X can prevent rogue access points and other unauthorized devices from becoming insecure backdoors
  • 16. Securing Wireless Transmissions countermeasures for eavesdropping: signal-hiding techniques • turning off service set identifier (SSID) broadcasted by wireless access points; • assigning cryptic names to SSIDs • reducing signal strength to the lowest level that still provides requisite coverage; • use of directional antennas and of signal-shielding techniques. encryption • the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions • Cryptographic algorithms
  • 17. Wireless LAN • IEEE 802 committee for LAN standards formed new working group for Wireless LAN • IEEE 802.11 formed in 1990’s – charter to develop a protocol & transmission specifications for wireless LANs (WLANs) • since then demand for WLANs, at different frequencies and data rates, has exploded, ever- expanding list of standards has been issued
  • 18. Wireless Fidelity (Wi-Fi) Alliance • 802.11b – first 802.11 standard to gain broad industry acceptance • Wireless Ethernet Compatibility Alliance (WECA) – industry consortium formed in 1999 to address the concern of products from different vendors successfully interoperating – later renamed the Wi-Fi Alliance • created a test suite to certify interoperability • Certification was initially for 802.11b, later extended to 802.11g • Certified 802.11b products are called as Wi-Fi
  • 19. IEEE 802 Protocol Architecture
  • 20. IEEE 802.11 Network Components
  • 22. 802.11 Wireless LAN Security • original 802.11 spec had security features • Wired Equivalent Privacy (WEP) algorithm • but found this contained major weaknesses – 802.11i task group developed capabilities to address WLAN security issues – Wi-Fi Alliance developed certification procedures for IEEEE 802.11 security standards called as Wi-Fi Protected Access (WPA) – final form 802.11i standard -Robust Security Network (RSN) – Recent version of WPA is WPA2 – incorporates all security features of IEEE802.11i WLAN security specification
  • 24. 802.11i RSN Services and Protocols TKIP – Temporal Key Integrity Protocol CCMP – Counter Mode with Cipher Block Chaining MAC Protocol
  • 26. 802.11i Phases of Operation
  • 27. Phases of Operation • Discovery: An AP uses messages called Beacons and Probe Responses to advertise its IEEE 802.11i security policy. The STA uses these to identify an AP for a WLAN with which it wishes to communicate. The STA associates with the AP, which it uses to select the cipher suite and authentication mechanism when the Beacons and Probe Responses present a choice. • Authentication: During this phase, the STA and AS prove their identities to each other. The AP blocks non- authentication traffic between the STA and AS until the authentication transaction is successful. The AP does not participate in the authentication transaction other than forwarding traffic between the STA and AS. •
  • 28. Phases of Operation • Key generation and distribution: The AP and the STA perform several operations that cause cryptographic keys to be generated and placed on the AP and the STA. Frames are exchanged between the AP and STA only • Protected data transfer: Frames are exchanged between the STA and the end station through the AP. As denoted by the shading and the encryption module icon, secure data transfer occurs between the STA and the AP only; security is not provided end-to-end. • Connection termination: The AP and STA exchange frames. During this phase, the secure connection is torn down and the connection is restored to the original state.