AJ Mancini IV Paul Schiffgens Jack O’Hara. WIRELESS SECURITY  Brief history of Wi-Fi  Wireless encryption standards  WEP/WPA  The problem with WEP.

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security flaws of the WEP-Protocol by Bastian Sopora, Seminar Computer Security 2006.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Security+ Guide to Network Security Fundamentals, Third Edition
Chalmers University of Technology Wireless security Breaking WEP and WPA.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
How To Not Make a Secure Protocol WEP Dan Petro.
The Trouble with WEP Or, cracking WiFi networks for fun & profit (not really) Jim Owens.
Wireless Network Security: WEP And Beyond Heidi Parsaye Jason DeVries Roxanne Ilse Heidi Parsaye - Jason DeVries - Roxanne Ilse.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Security – Wired Equivalent Privacy (WEP) By Shruthi B Krishnan.
Wireless Insecurity.
Wireless Security. Why is it important? Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Over.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
CSC-682 Advanced Computer Security
A History of WEP The Ups and Downs of Wireless Security.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Analyzing Wireless Security in Columbia, Missouri Matthew Chittum Clayton Harper John Mixon Johnathan Walton.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless Networking & Security Greg Stabler Spencer Smith.
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
 Advisor: Dr. Quincy Wu  Speaker: Hui - Hsiung Chung  Date:
Encryption Protocols used in Wireless Networks Derrick Grooms.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How To Not Make a Secure Protocol WEP Dan Petro.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Systems Architecture Breaking WEP in less than 60 seconds A presentation by Roman Scherer and Rainer Rehak June 12 th.
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
WEP & WPA Mandy Kershishnik.
Security and Wireless LANs
Wireless Security Ian Bodley.
Security Issues with Wireless Protocols
Inaugural meeting (for Hasheem: that means ‘the first meeting’
By: Anthony Gervasi & Adam Dickinson
Presentation transcript:

AJ Mancini IV Paul Schiffgens Jack O’Hara

WIRELESS SECURITY  Brief history of Wi-Fi  Wireless encryption standards  WEP/WPA  The problem with WEP  WPA/WPA2  Recommend use of WPA on home networks

WIRELESS SECURITY  First wireless local area network (WLAN)  ALOHAnet  University of Hawaii – 1970  Norman Abramson  Seven Computers, Four Islands  More publications to IEEE  ~ 1980  Including infrared and CDMA

WIRELESS SECURITY  Committee  Institute of Electrical and Electronic Engineers (IEEE)  IEEE – First Industry Standard  Followed by a/b/g

WIRELESS SECURITY  WEP  Wired Equivalent Privacy  Part of original standard  Deprecated in 2004  Still included in standard

WIRELESS SECURITY  Problems with WEP  40-bit or 104-bit key with 24-bit Initialization Vector (IV)  Government restriction on cryptography  WEP uses an RC4 stream cipher  Paramount that the same IV never be used twice  Problem: 50% chance that an IV will repeat after 5000 packets

WIRELESS SECURITY  Published attacks on WEP encryption  Scott Fluhrer, Itsik Mantin, Adi Shamir published crpytanalysis of RC4  aircrack-ng – crack any WEP key in minutes, regardless of size or complexity

WIRELESS SECURITY  Published attacks on WEP encryption  2005 – FBI demonstration  Andreas Klein expands on previous work, exposing more weaknesses in the RC4 cipher.

WIRELESS SECURITY  Published attacks on WEP encryption  Erik Tews, Andrei Pychkine, Ralf-Philipp Weinmann extend Klein’s work and apply RC4 weaknesses to WEP key recovery, develop new attack  104-bit key  40,000 packets – 50% recovery  60,000 packets – 80% recovery  85,000 packets – 95% recovery  Using packet injection, 40k packets can be generated in under 1 minute

WIRELESS SECURITY  Problems with WEP identified  WEP deprecated in 2004  i – Standard introduced Wi-Fi Protected Access (WPA)  Problem:  WEP is still included for compatibility with older equipment, is often the default form of security on consumer-level wireless equipment  Further problem: most equipment comes without any form of security enabled by default

WIRELESS SECURITY  WPA2  Can utilize Advanced Encryption Standard (AES) encryption  Government-qualified for Top Secret  Cipher has no known vulnerabilities  Only successful exploits are cross-channel attacks  Attacks made against implementation, not cipher  Disadvantage – requires hardware support

WIRELESS SECURITY  Recap  WEP 64/128 – 24 bit IV + 40/104 bit key  IVs must be unique – vulnerability  5000 IVs before repeat  WPA2 w/ AES  Top Secret-grade encryption  No vulnerabilities in the cipher  Authenticated and Encrypted

WIRELESS SECURITY  Recommend immediate adoption of WPA2 over WEP, unsecured networks