SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Lopamudra Das
CONTENTS
: WHAT IS WPA
: HISTORY OF WPA
: CONCEPT OF WPA
: WI-FI PROTECTED ACCESS -2
: GENERAL RECOMMENDATIONS
:ADVANTAGES & LIMITATION OF WPA
: CONCLUSION
: REFERENCIES
What is WPA?
 Wi-Fi Protected Access (WPA) is a response by the

WLAN industry to offer an immediate, a stronger
security solution.

 WPA is intended to be:
 A software/firmware upgrade to existing access points





and NICs.
Inexpensive in terms of time and cost to implement.
Compatible with vendors.
Suitable for enterprise, small sites, home networks.
Runs in enterprise mode or pre-shared key(PSK
mode)
History of WPA
 WPA was created by the Wi-Fi Alliance, an

industry trade group, which owns the
trademark to the Wi-Fi name and certifies
devices that carry that name.

 WPA is designed for use with an IEEE 802.1X

authentication server, which distributes
different keys to each user.
History of WPA

 The Wi-Fi Alliance created WPA to enable introduction of

standard-based secure wireless network products prior to the
IEEE 802.11i group finishing its work.

 The Wi-Fi Alliance at the time already anticipated the WPA2

certification based on the final draft of the IEEE 802.11i
standard.
concept of WPA
 Data is encrypted using the RC4 stream cipher, with a

128-bit key and a 48-bit initialization vector (IV).

 One major improvement in WPA is the Temporal Key

Integrity Protocol (TKIP), which dynamically changes
keys as the system is used.

 When combined with the much larger IV, this defeats

the well-known key recovery attacks on WEP.
General Recommendations
 Conduct a risk assessment for all information that

will travel over the WLAN and restrict sensitive
information.

 Policies and infrastructure for authenticating remote

access users can be applied to WLAN users.

 Perform regular audits of the WLAN using network

management and RF detection tools.
*Minimize signal leakage through

directional antennas and placement of
access points.
*Make sure all equipment being
purchased can be upgraded to
support WPA and WPA 2/AES.
*If using Pre-Shared Key Mode consider
that the shared secret may become
compromised.
THE FUTURE WAP 2
TKIP encryption, 802.1X/EAP authentication and PSK
technology in WPA are features that have been brought
forward from WPA2.
Additionally, WPA2 provides a new, encryption scheme, the
Advanced Encryption Standard (AES).
AES uses a mathematical ciphering algorithm that employs
variable key sizes of 128-, 192- or 256-bits.
WPA2 offers a highly secure “mixed mode” that supports
both WPA and WPA2 client workstations.
ADVANTAGES
It’s flexible: With a wireless network you and your staff can
have uninterrupted access to people, information and tools as
you and they move through the workplace with your mobile
PC.

It’s responsive: As you change your business operations
your wireless network can change with you.

It’s customized: Your wireless network can be configured
the way you want it.-even combined with your current wired
network
It’s fast:

From 11 to 54 Mbps throughput and
advanced roaming capabilities provide reliable access
to e-mail, the Internet, file sharing and other
network resources away from the desk.

It’s cost-effective: Expand and extend your
existing network by simply adding more adapters and
access points. Planning is a no brainier as you need
to buy only what you need.

It’s secure: Current standards utilizes 64- and 128bit WEP encryption and help guard the network from
intruders and protect data in transit. Add in
technology and you have increased WLAN protection
important for mission-critical data.
LIMITATION
* It has a limited bandwidth of about 83.5 MHz.
*Frequency spectrum used by IEEE 802.11b is shared by many
other systems like microwave ovens, cordless phones etc. This
frequency sharing causes interference problem.
* Security techniques are not reliable yet.
APPLICATION
1. Internet access.
2. City wide Wi-Fi.
3. Campus wide Wi-Fi.
4. Direct computer to computer communication.
conclusion
As a subset of WPA2, WPA presents users with a solution
that is both forward- and backward-compatible with
present and future wireless standards.
It offers enterprise-grade protection
importantly, it is available today.

and,

most

WPA allows users, whether they are at home or at work,
to enjoy all the mobility and flexibility that Wi-Fi wireless
computing has to offer, knowing that their data is safely
protected beyond the reach of intruders.
References














“Overview of IEEE 802.11 Security”, www.techonline.com.
www.wikipedia.org
www.lib-asc.ekm.org
www.wi-fi.org
Paper on Wi-Fi security from the Wi-Fi alliance.
www.entecollege.com
www.ieeespectrum.com
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Wpa3
Wpa3Wpa3
Wpa3
 
Aircrack
AircrackAircrack
Aircrack
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 

Andere mochten auch

Andere mochten auch (7)

Ch 14
Ch 14Ch 14
Ch 14
 
Wlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC SublayerWlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC Sublayer
 
WLAN
WLANWLAN
WLAN
 
Ppt 802.11n
Ppt 802.11nPpt 802.11n
Ppt 802.11n
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 

Ähnlich wie Wi fi protected access

Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedIRJET Journal
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.pptabenimelos
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Databook 2018 ver2
Databook 2018 ver2Databook 2018 ver2
Databook 2018 ver2DrayTek
 

Ähnlich wie Wi fi protected access (20)

Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi fi
Wi fiWi fi
Wi fi
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Databook 2018 ver2
Databook 2018 ver2Databook 2018 ver2
Databook 2018 ver2
 
Ap8222 ss
Ap8222 ssAp8222 ss
Ap8222 ss
 

Kürzlich hochgeladen

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Kürzlich hochgeladen (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Wi fi protected access

  • 2. CONTENTS : WHAT IS WPA : HISTORY OF WPA : CONCEPT OF WPA : WI-FI PROTECTED ACCESS -2 : GENERAL RECOMMENDATIONS :ADVANTAGES & LIMITATION OF WPA : CONCLUSION : REFERENCIES
  • 3. What is WPA?  Wi-Fi Protected Access (WPA) is a response by the WLAN industry to offer an immediate, a stronger security solution.  WPA is intended to be:  A software/firmware upgrade to existing access points     and NICs. Inexpensive in terms of time and cost to implement. Compatible with vendors. Suitable for enterprise, small sites, home networks. Runs in enterprise mode or pre-shared key(PSK mode)
  • 4. History of WPA  WPA was created by the Wi-Fi Alliance, an industry trade group, which owns the trademark to the Wi-Fi name and certifies devices that carry that name.  WPA is designed for use with an IEEE 802.1X authentication server, which distributes different keys to each user.
  • 5. History of WPA  The Wi-Fi Alliance created WPA to enable introduction of standard-based secure wireless network products prior to the IEEE 802.11i group finishing its work.  The Wi-Fi Alliance at the time already anticipated the WPA2 certification based on the final draft of the IEEE 802.11i standard.
  • 6. concept of WPA  Data is encrypted using the RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV).  One major improvement in WPA is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used.  When combined with the much larger IV, this defeats the well-known key recovery attacks on WEP.
  • 7. General Recommendations  Conduct a risk assessment for all information that will travel over the WLAN and restrict sensitive information.  Policies and infrastructure for authenticating remote access users can be applied to WLAN users.  Perform regular audits of the WLAN using network management and RF detection tools.
  • 8. *Minimize signal leakage through directional antennas and placement of access points. *Make sure all equipment being purchased can be upgraded to support WPA and WPA 2/AES. *If using Pre-Shared Key Mode consider that the shared secret may become compromised.
  • 9.
  • 10. THE FUTURE WAP 2 TKIP encryption, 802.1X/EAP authentication and PSK technology in WPA are features that have been brought forward from WPA2. Additionally, WPA2 provides a new, encryption scheme, the Advanced Encryption Standard (AES). AES uses a mathematical ciphering algorithm that employs variable key sizes of 128-, 192- or 256-bits. WPA2 offers a highly secure “mixed mode” that supports both WPA and WPA2 client workstations.
  • 11. ADVANTAGES It’s flexible: With a wireless network you and your staff can have uninterrupted access to people, information and tools as you and they move through the workplace with your mobile PC. It’s responsive: As you change your business operations your wireless network can change with you. It’s customized: Your wireless network can be configured the way you want it.-even combined with your current wired network
  • 12. It’s fast: From 11 to 54 Mbps throughput and advanced roaming capabilities provide reliable access to e-mail, the Internet, file sharing and other network resources away from the desk. It’s cost-effective: Expand and extend your existing network by simply adding more adapters and access points. Planning is a no brainier as you need to buy only what you need. It’s secure: Current standards utilizes 64- and 128bit WEP encryption and help guard the network from intruders and protect data in transit. Add in technology and you have increased WLAN protection important for mission-critical data.
  • 13. LIMITATION * It has a limited bandwidth of about 83.5 MHz. *Frequency spectrum used by IEEE 802.11b is shared by many other systems like microwave ovens, cordless phones etc. This frequency sharing causes interference problem. * Security techniques are not reliable yet.
  • 14. APPLICATION 1. Internet access. 2. City wide Wi-Fi. 3. Campus wide Wi-Fi. 4. Direct computer to computer communication.
  • 15. conclusion As a subset of WPA2, WPA presents users with a solution that is both forward- and backward-compatible with present and future wireless standards. It offers enterprise-grade protection importantly, it is available today. and, most WPA allows users, whether they are at home or at work, to enjoy all the mobility and flexibility that Wi-Fi wireless computing has to offer, knowing that their data is safely protected beyond the reach of intruders.
  • 16. References              “Overview of IEEE 802.11 Security”, www.techonline.com. www.wikipedia.org www.lib-asc.ekm.org www.wi-fi.org Paper on Wi-Fi security from the Wi-Fi alliance. www.entecollege.com www.ieeespectrum.com