National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE 200118189.

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
Security+ Guide to Network Security Fundamentals, Third Edition
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Wireless Network Security Issues By Advait Kothare SJSU CS265 Fall 2004.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Review of Wireless LAN Security Chapter-9
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Wireless Networking.
Wireless Networks Tamus, Zoltán Ádám
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
無線網路安全 WEP. Requirements of Network Security Information Security Confidentiality Integrity Availability Non-repudiation Attack defense Passive Attack.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Your Wireless Network has No Clothes* William A. Arbaugh, Narendar Shankar Y.C. Justin Wan University of Maryland Presentation by Eddy Purnomo,
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Wireless Network Security CSIS 5857: Encoding and Encryption.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Wireless Protocols WEP, WPA & WPA2.
WEP & WPA Mandy Kershishnik.
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
Presentation transcript:

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE Under the guidance of Mr. Siddhartha Bhusan Neelamani

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [2] It is also easy to interfere with wireless communications. A simple jamming transmitter can make communications impossible. For example, consistently hammering an access point with access requests, whether successful or not, will eventually exhaust its available radio frequency spectrum and knock it off the network. Advantages of WLAN Disadvantages WLAN Introduction

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [3] WLAN Authentication Wireless LANs, because of their broadcast nature, require the addition of: User authentication Data privacy Authenticating wireless LAN clients. Client Authentication Process

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [4] WLAN Authentication Types Of Authentication  Open Authentication The authentication request The authentication response  Shared Key Authentication requires that the client configure a static WEP key  Service Set Identifier (SSID)  MAC Address Authentication MAC address authentication verifies the client’s MAC address against a locally configured list of allowed addresses or against an external authentication server

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [5] WLAN Authentication Vulnerabilities SSID An eavesdropper can easily determine the SSID with the use of an wireless LAN packet analyzer, like Sniffer Pro. Open Authentication Open authentication provides no way for the access point to determine whether a client is valid. Shared Key Authentication Vulnerabilities The process of exchanging the challenge text occurs over the wireless link and is vulnerable to a man-in-the-middle attack MAC Address Authentication Vulnerabilities A protocol analyzer can be used to determine a valid MAC address

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [6] WEP Encryption WEP is based on the RC4 algorithm, which is a symmetric key stream cipher. The encryption keys must match on both the client and the access point for frame exchanges to succeed  Stream Ciphers Encrypts data by generating a key stream from the key and performing the XOR function on the key stream with the plain-text data

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [7] WEP Encryption  Block Ciphers Fragments the frame into blocks of predetermined size and performs the XOR function on each block.

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [8] W EP Encryption Weaknesses There are two encryption techniques to overcome WEP encryption weakness  Initialization vectors  Feedback modes Initialization vectors

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [9] W EP Encryption Weaknesses Feedback Modes

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [10] W EP Encryption Weaknesses Statistical Key Derivation—Passive Network Attacks A WEP key could be derived by passively collecting particular frames from a wireless LAN Inductive Key Derivation—Active Network Attacks Inductive key derivation is the process of deriving a key by coercing information from the wireless LAN  Initialization Vector Replay Attacks  Bit-Flipping Attacks Static WEP Key Management Issues

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [11] Component of WLAN Security The Authentication Framework (802.1X) The EAP Authentication Algorithm  Mutual Authentication  User-Based Authentication  Dynamic WEP Keys Data Privacy with TKIP (Temporal Key Integrity Protocol )  A message integrity check (MIC  Per-packet keying  Broadcast Key Rotation

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [12] Future of WLAN Security AES ( Advanced Encryption Standard )  AES-OCB Mode

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [13] Future of WLAN Security  AES-CCM Mode

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [14] Conclusion Wireless LAN deployments should be made as secure as possible. Standard security is weak and vulnerable to numerous network attacks. This paper has highlighted these vulnerabilities and described how it can be solved to create secure wireless LANs. Some security enhancement features might not be deployable in some situations because of device limitations such as application specific devices (ASDs such as phones capable of static WEP only) or mixed vendor environments. In such cases, it is important that the network administrator understand the potential WLAN security vulnerabilities.

National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [15] Thank You!!!