1 / 22

WIRELESS LAN AND SECURITY

WIRELESS LAN AND SECURITY. PREPARED BY: DHARMRAJ V. CHUDASAMA 6 TH INFORMATION TECHNOLOGY ROLL NO 7. INTRODUCTION. WIRELESS TECHNOLOGY IS STRECHING ITS LEGS DAY BY DAY MOBILE DEVICES HAVE GONE BEYOND COUNTLESS LIMITS MANY USERS DON’T KNOW WHAT IS THERE IN THEIR MAGICAL KIT.

brenna
Download Presentation

WIRELESS LAN AND SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WIRELESS LAN AND SECURITY PREPARED BY: DHARMRAJ V. CHUDASAMA 6TH INFORMATION TECHNOLOGY ROLL NO 7

  2. INTRODUCTION • WIRELESS TECHNOLOGY IS STRECHING ITS LEGS DAY BY DAY • MOBILE DEVICES HAVE GONE BEYOND COUNTLESS LIMITS • MANY USERS DON’T KNOW WHAT IS THERE IN THEIR MAGICAL KIT

  3. Anatomy of a radio LAN • The radio modem • The MAC controller • The host interface • The driver • Wireless LAN or not • Professional and Home Wireless LANs

  4. Functional diagram of a Wireless device

  5. The radio modem • ISM frequency bands at 900 MHz & 2.4 GHz • HiperLAN and UNII band • Spread Spectrum Technology • Diversity • Directional Antennas • Range Issues

  6. Range Issues

  7. The MAC Level • Main channel access mechanisms TDMA CSMA/CA Polling MAC • MAC Techniques MAC Retransmission Fragmentation RTS/CTS • Network Topology Ad-hoc Access point and Roaming Radio MAC Forwarding

  8. RTS/CTS Technique

  9. Security • Authentication and Identification Requirements in Wireless Tech • Assumptions in Password Authentication Assurance of Authentication Secured Communication channel Limit number of wrong guesses Easy remembrance

  10. The problem with WLAN • The user has no way to knowing where the access point is? • The radio network that can be monitored by anyone with a radio receiver. • The attacker can make password guesses on separate computer.

  11. Requirements for Wireless Authentication • Requirements (Must Have) • Additional Characteristics (Should Have) • Other Useful Features

  12. Requirements (Must Have) • Mutual • Self-protecting • Immure to dictionary attacks • Produces session key

  13. Additional Characteristics • Authenticates User • Forward Secrecy • Access Points • Quick and Efficient • Low Maintenance Cost • Convenient for Users

  14. Other Useful Features • Augments Legacy Methods • Fast Re-authentication

  15. Certificate base methods • EAP-TLS • EAP-TTLS • PEAP

  16. EAP-TTLS

  17. Problems with CBM • Cost of administration • Lengthy protocol exchange • Authenticates the device instead of the user/require a smart card

  18. Password authentication methods • LEAP • Strong password authentication • The power of the SPEKE

  19. Wireless Security in Enterprise

  20. KNOWING RISKS • Insertion attacks • Interception • Jamming • Client to client attack • Encryption attack

  21. Conclusion • Wireless Networks are inevitable in this growing market • They are the most successful means of communication • Cost savings, productivity, competitive market advantages • Question is not whether but when will be need wireless security?

  22. Thank you

More Related