SlideShare uma empresa Scribd logo
1 de 17
1
Wireless LAN
(Networking and Security)
Presented By
Akshay N Mahajan
2
• Exists in infrastructure mode or
ad hoc mode .
• ad hoc mode : Clients communicate without
the aid of a Central access Point.
• Infrastructure mode : Usually a WLAN
connected with a wired network.
WIRELESS
( LOCAL AREA NETWORK )
3
TYPES OF WIRELESS LANs
• Infrared LAN : Used to connect computers
within a room.They can’t penetrate opaque
walls.
• Spread Spectrum LAN : Uses the spread
spectrum technology to communicate.
• Narrowband microwave : Use micro waves
to communicate.
4
TECHNOLOGY VIEW
(Standards for wireless LAN)
• Hyper LAN : It’s an European
telecommunication standards institutes
(ETSI) standard.
• Bluetooth : Specified by Bluetooth special
interest group.Used for short range wireless
connectivity.
• 802.11 wireless technology : Specified by
the IEEE(Institute of Electrical &
Electronics).
5
WIRELESS LANs
ARE TARGETS
• Medium for communication air hence most
insecure.
• Constantly hammering an access point with
access requests can cause jamming.
• Interference with other wireless services
using the same frequency range e.g.
Bluetooth.
6
WIRELESS LANs
ARE TERGETS
• MAC authentication fail in front of
firmware using randomly chosen spoofed
address.
• In case of ad hoc modes any hacker with a
adapter configured for ad hoc mode can
easily access the peer to peer network.
7
SECURING THE
WIRELESS NETWORKS
• Checking the rogue access points.
• WEP (Wired Equivalent Privacy) frame
encryption.
• IP sec (Internet protocol security) .
• 802.1x/EAP :
8
1)ROGUE ACCESS POINTS
• A rogue access point is one that is
accessible to an organizations employees
but is not managed as a part of the trusted
network (with no security measures
enabled).
9
2)WEP FRAME ENCRYPTION
• Process of converting clear text to cipher text.
Decryption is reverse of the process.
• Key is the only piece of information to be shared
by both the end points.
10
2)WEP HAS FLAWS
• Static WEP keying calls for the tiring job of
entering the same keys on every device.
• If a device using static WEP key is lost, the
possessor of the device can be easily
access the LAN.
• WEP uses RC4 encryption.Which becomes
unsafe when initialization vector is
repeated.
11
2) TKIP & AES
(WEP Enhancements)
• TKIP include per packet keying and message
integrity check.
• AES, a stronger alternative to RC4.
12
3) IPsec (Internet Protocol
security)
• IPsec design is a frame work for multiple
services like secrecy, data integrity and
protection from replay attacks.
• Consists of 2 parts :
1st carries security identifier
2nd deals with establishing keys
• Used in Transport mode and Tunnel mode.
13
4) 802.1x/EAP
EAP(Extensible Authentication Protocol) types
LEAP
(widely deployed
EAP type
in use today)
TLS
uses digital certificates
for both user and
server authentication
PEAP
Uses digital
certificate for
server authentication
EAP
(frame work for providing
centralized authentication
and dynamic key distribution)
14
THE EAP AUTHENTICATION PROCESS
15
THE LEAP AUTHENTICATION PROCESS
16
THE TLS AUTHENTICATION PROCESS
17
Much more to be done
• Wireless communication still prone to
insecurities.
• Stronger and full proof encryption
techniques , than the currently used
RC4must be developed.
• Much more research needed in the design
field of wireless technology.

Mais conteúdo relacionado

Mais procurados

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Wireless security
Wireless securityWireless security
Wireless security
paripec
 

Mais procurados (20)

Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wifi security
Wifi securityWifi security
Wifi security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 

Semelhante a Wlan networking and security

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
tardeep
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
JigsAshley
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
al-sari7
 

Semelhante a Wlan networking and security (20)

Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Wifi
WifiWifi
Wifi
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
Wireless networking and security
Wireless networking and securityWireless networking and security
Wireless networking and security
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
Vision
VisionVision
Vision
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 

Mais de akki_hearts (16)

IT innovation in India
IT innovation in IndiaIT innovation in India
IT innovation in India
 
Insider (Network Tool)
Insider (Network Tool)Insider (Network Tool)
Insider (Network Tool)
 
Project report(Smart Auction Access)
Project report(Smart Auction Access)Project report(Smart Auction Access)
Project report(Smart Auction Access)
 
Seminar front page 2013_07_08_10_42_10
Seminar front page  2013_07_08_10_42_10Seminar front page  2013_07_08_10_42_10
Seminar front page 2013_07_08_10_42_10
 
ack
ackack
ack
 
Sixth sense technology 04
Sixth  sense technology 04Sixth  sense technology 04
Sixth sense technology 04
 
Topology
TopologyTopology
Topology
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Wimax
WimaxWimax
Wimax
 
Wi fi
Wi fiWi fi
Wi fi
 
Artificial inteligence
Artificial inteligenceArtificial inteligence
Artificial inteligence
 
Beautiful world
Beautiful worldBeautiful world
Beautiful world
 
motherboard
motherboardmotherboard
motherboard
 
Crimping
CrimpingCrimping
Crimping
 
Windows 8
Windows 8Windows 8
Windows 8
 
Library management
Library managementLibrary management
Library management
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Wlan networking and security

  • 1. 1 Wireless LAN (Networking and Security) Presented By Akshay N Mahajan
  • 2. 2 • Exists in infrastructure mode or ad hoc mode . • ad hoc mode : Clients communicate without the aid of a Central access Point. • Infrastructure mode : Usually a WLAN connected with a wired network. WIRELESS ( LOCAL AREA NETWORK )
  • 3. 3 TYPES OF WIRELESS LANs • Infrared LAN : Used to connect computers within a room.They can’t penetrate opaque walls. • Spread Spectrum LAN : Uses the spread spectrum technology to communicate. • Narrowband microwave : Use micro waves to communicate.
  • 4. 4 TECHNOLOGY VIEW (Standards for wireless LAN) • Hyper LAN : It’s an European telecommunication standards institutes (ETSI) standard. • Bluetooth : Specified by Bluetooth special interest group.Used for short range wireless connectivity. • 802.11 wireless technology : Specified by the IEEE(Institute of Electrical & Electronics).
  • 5. 5 WIRELESS LANs ARE TARGETS • Medium for communication air hence most insecure. • Constantly hammering an access point with access requests can cause jamming. • Interference with other wireless services using the same frequency range e.g. Bluetooth.
  • 6. 6 WIRELESS LANs ARE TERGETS • MAC authentication fail in front of firmware using randomly chosen spoofed address. • In case of ad hoc modes any hacker with a adapter configured for ad hoc mode can easily access the peer to peer network.
  • 7. 7 SECURING THE WIRELESS NETWORKS • Checking the rogue access points. • WEP (Wired Equivalent Privacy) frame encryption. • IP sec (Internet protocol security) . • 802.1x/EAP :
  • 8. 8 1)ROGUE ACCESS POINTS • A rogue access point is one that is accessible to an organizations employees but is not managed as a part of the trusted network (with no security measures enabled).
  • 9. 9 2)WEP FRAME ENCRYPTION • Process of converting clear text to cipher text. Decryption is reverse of the process. • Key is the only piece of information to be shared by both the end points.
  • 10. 10 2)WEP HAS FLAWS • Static WEP keying calls for the tiring job of entering the same keys on every device. • If a device using static WEP key is lost, the possessor of the device can be easily access the LAN. • WEP uses RC4 encryption.Which becomes unsafe when initialization vector is repeated.
  • 11. 11 2) TKIP & AES (WEP Enhancements) • TKIP include per packet keying and message integrity check. • AES, a stronger alternative to RC4.
  • 12. 12 3) IPsec (Internet Protocol security) • IPsec design is a frame work for multiple services like secrecy, data integrity and protection from replay attacks. • Consists of 2 parts : 1st carries security identifier 2nd deals with establishing keys • Used in Transport mode and Tunnel mode.
  • 13. 13 4) 802.1x/EAP EAP(Extensible Authentication Protocol) types LEAP (widely deployed EAP type in use today) TLS uses digital certificates for both user and server authentication PEAP Uses digital certificate for server authentication EAP (frame work for providing centralized authentication and dynamic key distribution)
  • 17. 17 Much more to be done • Wireless communication still prone to insecurities. • Stronger and full proof encryption techniques , than the currently used RC4must be developed. • Much more research needed in the design field of wireless technology.