1 / 12

A Wireless LAN Security Protocol

A Wireless LAN Security Protocol. CTP/CURTIN/2011/GROUP 29. Group Members. DCN09C4-0808 D.M.N.Dissanayake. Why WLAN Security?. Intruders who try to attack the computers Rogue AP Soft AP MAC spoofing Denial of Service

fedora
Download Presentation

A Wireless LAN Security Protocol

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Wireless LAN Security Protocol CTP/CURTIN/2011/GROUP 29

  2. Group Members DCN09C4-0808 D.M.N.Dissanayake

  3. Why WLAN Security? Intruders who try to attack the computers Rogue AP Soft AP MAC spoofing Denial of Service The communication between server and client of a WLAN can be hacked by an intruder.

  4. Security Requirments Confidentiality -Messages sent must be encrypted Authentication -Origin of message received must be verified Integrity -Integrity of messages received must be verified Access Control -Access for legitimate entities only

  5. Available Protocols WPE (Wired Equivalent Privacy) WPA (Wi-Fi Protected Access) WPA2 TKIP (Temporal Key Integrity Protocol)

  6. New Protocol Client generate a session key. User Inputs a key Hashes are generated for both the keys. The user-input key is encrypted with the time key and the time key is encrypted with a hard-coded key.

  7. New Protocol cont… Client sends the hashes and encrypted passwords to server through an access point Server decrypts keys Server generates hashes for the decrypted keys and compares them with the hashes If all is good, further communication is done using same user key.

  8. New Protocol cont… If there is a failure, the session is terminated. The client sends “exit” command, and the session is terminated.

  9. Block Diagram

  10. Time Plan

  11. Advantages of this protocol… User may be able use a very interact with other computers more securely.

  12. Thank You

More Related