SlideShare ist ein Scribd-Unternehmen logo
1 von 17
1
Wireless LAN
(Networking and Security)
Presented By
Akshay N Mahajan
2
• Exists in infrastructure mode or
ad hoc mode .
• ad hoc mode : Clients communicate without
the aid of a Central access Point.
• Infrastructure mode : Usually a WLAN
connected with a wired network.
WIRELESS
( LOCAL AREA NETWORK )
3
TYPES OF WIRELESS LANs
• Infrared LAN : Used to connect computers
within a room.They can’t penetrate opaque
walls.
• Spread Spectrum LAN : Uses the spread
spectrum technology to communicate.
• Narrowband microwave : Use micro waves
to communicate.
4
TECHNOLOGY VIEW
(Standards for wireless LAN)
• Hyper LAN : It’s an European
telecommunication standards institutes
(ETSI) standard.
• Bluetooth : Specified by Bluetooth special
interest group.Used for short range wireless
connectivity.
• 802.11 wireless technology : Specified by
the IEEE(Institute of Electrical &
Electronics).
5
WIRELESS LANs
ARE TARGETS
• Medium for communication air hence most
insecure.
• Constantly hammering an access point with
access requests can cause jamming.
• Interference with other wireless services
using the same frequency range e.g.
Bluetooth.
6
WIRELESS LANs
ARE TERGETS
• MAC authentication fail in front of
firmware using randomly chosen spoofed
address.
• In case of ad hoc modes any hacker with a
adapter configured for ad hoc mode can
easily access the peer to peer network.
7
SECURING THE
WIRELESS NETWORKS
• Checking the rogue access points.
• WEP (Wired Equivalent Privacy) frame
encryption.
• IP sec (Internet protocol security) .
• 802.1x/EAP :
8
1)ROGUE ACCESS POINTS
• A rogue access point is one that is
accessible to an organizations employees
but is not managed as a part of the trusted
network (with no security measures
enabled).
9
2)WEP FRAME ENCRYPTION
• Process of converting clear text to cipher text.
Decryption is reverse of the process.
• Key is the only piece of information to be shared
by both the end points.
10
2)WEP HAS FLAWS
• Static WEP keying calls for the tiring job of
entering the same keys on every device.
• If a device using static WEP key is lost, the
possessor of the device can be easily
access the LAN.
• WEP uses RC4 encryption.Which becomes
unsafe when initialization vector is
repeated.
11
2) TKIP & AES
(WEP Enhancements)
• TKIP include per packet keying and message
integrity check.
• AES, a stronger alternative to RC4.
12
3) IPsec (Internet Protocol
security)
• IPsec design is a frame work for multiple
services like secrecy, data integrity and
protection from replay attacks.
• Consists of 2 parts :
1st carries security identifier
2nd deals with establishing keys
• Used in Transport mode and Tunnel mode.
13
4) 802.1x/EAP
EAP(Extensible Authentication Protocol) types
LEAP
(widely deployed
EAP type
in use today)
TLS
uses digital certificates
for both user and
server authentication
PEAP
Uses digital
certificate for
server authentication
EAP
(frame work for providing
centralized authentication
and dynamic key distribution)
14
THE EAP AUTHENTICATION PROCESS
15
THE LEAP AUTHENTICATION PROCESS
16
THE TLS AUTHENTICATION PROCESS
17
Much more to be done
• Wireless communication still prone to
insecurities.
• Stronger and full proof encryption
techniques , than the currently used
RC4must be developed.
• Much more research needed in the design
field of wireless technology.

Weitere ähnliche Inhalte

Was ist angesagt?

Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 

Was ist angesagt? (20)

Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wifi security
Wifi securityWifi security
Wifi security
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 

Ähnlich wie Wlan networking and security

Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applicationscmstiernberg
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)Sam Bowne
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)Sam Bowne
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologiesInocentshuja Ahmad
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networksArunChokkalingam
 
Wireless networking and security
Wireless networking and securityWireless networking and security
Wireless networking and securityKowsalyaS12
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiMostafa Ali
 

Ähnlich wie Wlan networking and security (20)

Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Wifi
WifiWifi
Wifi
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
Wireless networking and security
Wireless networking and securityWireless networking and security
Wireless networking and security
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
Vision
VisionVision
Vision
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 

Mehr von akki_hearts

IT innovation in India
IT innovation in IndiaIT innovation in India
IT innovation in Indiaakki_hearts
 
Insider (Network Tool)
Insider (Network Tool)Insider (Network Tool)
Insider (Network Tool)akki_hearts
 
Project report(Smart Auction Access)
Project report(Smart Auction Access)Project report(Smart Auction Access)
Project report(Smart Auction Access)akki_hearts
 
Seminar front page 2013_07_08_10_42_10
Seminar front page  2013_07_08_10_42_10Seminar front page  2013_07_08_10_42_10
Seminar front page 2013_07_08_10_42_10akki_hearts
 
Sixth sense technology 04
Sixth  sense technology 04Sixth  sense technology 04
Sixth sense technology 04akki_hearts
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loopakki_hearts
 
Artificial inteligence
Artificial inteligenceArtificial inteligence
Artificial inteligenceakki_hearts
 
Library management
Library managementLibrary management
Library managementakki_hearts
 

Mehr von akki_hearts (16)

IT innovation in India
IT innovation in IndiaIT innovation in India
IT innovation in India
 
Insider (Network Tool)
Insider (Network Tool)Insider (Network Tool)
Insider (Network Tool)
 
Project report(Smart Auction Access)
Project report(Smart Auction Access)Project report(Smart Auction Access)
Project report(Smart Auction Access)
 
Seminar front page 2013_07_08_10_42_10
Seminar front page  2013_07_08_10_42_10Seminar front page  2013_07_08_10_42_10
Seminar front page 2013_07_08_10_42_10
 
ack
ackack
ack
 
Sixth sense technology 04
Sixth  sense technology 04Sixth  sense technology 04
Sixth sense technology 04
 
Topology
TopologyTopology
Topology
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Wimax
WimaxWimax
Wimax
 
Wi fi
Wi fiWi fi
Wi fi
 
Artificial inteligence
Artificial inteligenceArtificial inteligence
Artificial inteligence
 
Beautiful world
Beautiful worldBeautiful world
Beautiful world
 
motherboard
motherboardmotherboard
motherboard
 
Crimping
CrimpingCrimping
Crimping
 
Windows 8
Windows 8Windows 8
Windows 8
 
Library management
Library managementLibrary management
Library management
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Wlan networking and security

  • 1. 1 Wireless LAN (Networking and Security) Presented By Akshay N Mahajan
  • 2. 2 • Exists in infrastructure mode or ad hoc mode . • ad hoc mode : Clients communicate without the aid of a Central access Point. • Infrastructure mode : Usually a WLAN connected with a wired network. WIRELESS ( LOCAL AREA NETWORK )
  • 3. 3 TYPES OF WIRELESS LANs • Infrared LAN : Used to connect computers within a room.They can’t penetrate opaque walls. • Spread Spectrum LAN : Uses the spread spectrum technology to communicate. • Narrowband microwave : Use micro waves to communicate.
  • 4. 4 TECHNOLOGY VIEW (Standards for wireless LAN) • Hyper LAN : It’s an European telecommunication standards institutes (ETSI) standard. • Bluetooth : Specified by Bluetooth special interest group.Used for short range wireless connectivity. • 802.11 wireless technology : Specified by the IEEE(Institute of Electrical & Electronics).
  • 5. 5 WIRELESS LANs ARE TARGETS • Medium for communication air hence most insecure. • Constantly hammering an access point with access requests can cause jamming. • Interference with other wireless services using the same frequency range e.g. Bluetooth.
  • 6. 6 WIRELESS LANs ARE TERGETS • MAC authentication fail in front of firmware using randomly chosen spoofed address. • In case of ad hoc modes any hacker with a adapter configured for ad hoc mode can easily access the peer to peer network.
  • 7. 7 SECURING THE WIRELESS NETWORKS • Checking the rogue access points. • WEP (Wired Equivalent Privacy) frame encryption. • IP sec (Internet protocol security) . • 802.1x/EAP :
  • 8. 8 1)ROGUE ACCESS POINTS • A rogue access point is one that is accessible to an organizations employees but is not managed as a part of the trusted network (with no security measures enabled).
  • 9. 9 2)WEP FRAME ENCRYPTION • Process of converting clear text to cipher text. Decryption is reverse of the process. • Key is the only piece of information to be shared by both the end points.
  • 10. 10 2)WEP HAS FLAWS • Static WEP keying calls for the tiring job of entering the same keys on every device. • If a device using static WEP key is lost, the possessor of the device can be easily access the LAN. • WEP uses RC4 encryption.Which becomes unsafe when initialization vector is repeated.
  • 11. 11 2) TKIP & AES (WEP Enhancements) • TKIP include per packet keying and message integrity check. • AES, a stronger alternative to RC4.
  • 12. 12 3) IPsec (Internet Protocol security) • IPsec design is a frame work for multiple services like secrecy, data integrity and protection from replay attacks. • Consists of 2 parts : 1st carries security identifier 2nd deals with establishing keys • Used in Transport mode and Tunnel mode.
  • 13. 13 4) 802.1x/EAP EAP(Extensible Authentication Protocol) types LEAP (widely deployed EAP type in use today) TLS uses digital certificates for both user and server authentication PEAP Uses digital certificate for server authentication EAP (frame work for providing centralized authentication and dynamic key distribution)
  • 17. 17 Much more to be done • Wireless communication still prone to insecurities. • Stronger and full proof encryption techniques , than the currently used RC4must be developed. • Much more research needed in the design field of wireless technology.