120 likes | 246 Views
A Wireless LAN Security Protocol. CTP/CURTIN/2011/GROUP 29. Group Members. DCN09C4-0808 D.M.N.Dissanayake. Why WLAN Security?. Intruders who try to attack the computers Rogue AP Soft AP MAC spoofing Denial of Service
E N D
A Wireless LAN Security Protocol CTP/CURTIN/2011/GROUP 29
Group Members DCN09C4-0808 D.M.N.Dissanayake
Why WLAN Security? Intruders who try to attack the computers Rogue AP Soft AP MAC spoofing Denial of Service The communication between server and client of a WLAN can be hacked by an intruder.
Security Requirments Confidentiality -Messages sent must be encrypted Authentication -Origin of message received must be verified Integrity -Integrity of messages received must be verified Access Control -Access for legitimate entities only
Available Protocols WPE (Wired Equivalent Privacy) WPA (Wi-Fi Protected Access) WPA2 TKIP (Temporal Key Integrity Protocol)
New Protocol Client generate a session key. User Inputs a key Hashes are generated for both the keys. The user-input key is encrypted with the time key and the time key is encrypted with a hard-coded key.
New Protocol cont… Client sends the hashes and encrypted passwords to server through an access point Server decrypts keys Server generates hashes for the decrypted keys and compares them with the hashes If all is good, further communication is done using same user key.
New Protocol cont… If there is a failure, the session is terminated. The client sends “exit” command, and the session is terminated.
Advantages of this protocol… User may be able use a very interact with other computers more securely.