Security Issues of 802.11b

Security Issues of IEEE 802.11b Wireless Local Area Networks Issues | Analysis | Suggestions | Solutions | Adaptations Seminar on Security Issues of 802.11b presented on 21-10-2008 by Sreekanth G S, 274, R7, Computer Science, Sree Chitra Thirunal College of Engineering
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],WEP’s security flaws (contd…) ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],RC4 Algorithm (contd…) The key-scheduling algorithm (KSA) The key-scheduling algorithm is used to initialize the permutation in the array "S". "keylength" is defined as the number of bytes in the key and can be in the range 1 ≤ keylength ≤ 256, corresponding to a key length of 40 – 128 bits. First, the array "S" is initialized to the identity permutation. S is then processed for 256 iterations. for  i  from  0  to  255  S[i] := i  endfor   j := 0  for  i  from  0  to  255  j := (j + S[i] + key[i mod keylength]) mod 256  Swap (S[i],S[j])  endfor
[object Object],[object Object],RC4 Algorithm (contd…) The pseudo-random generation algorithm (PRGA) For as many iterations as are needed, the PRGA modifies the state and outputs a byte of the keystream. In each iteration, the PRGA increments  i , adds the value of S pointed to by  i  to  j , exchanges the values of S[ i ] and S[ j ], and then outputs the value of S at the location S[i] + S[j] (modulo 256). Each value of S is swapped at least once every 256 iterations. i := 0  j := 0  while  GeneratingOutput:  i := (i + 1) mod 256  j := (j + S[i]) mod 256  Swap(S[i],S[j])  Output S[(S[i] + S[j]) mod 256] ^ input[i]  endwhile
[object Object],[object Object],RC4 Algorithm (contd…) Test Vectors Sample test vectors are provided below: RC4( "Key", "Plaintext" ) == BBF316E8D940AF0AD3  RC4( "Wiki", "pedia" ) == 1021BF0420  RC4( "Secret", "Attack at dawn" ) == 45A01F645FC35B383552544B9BF5  OR In Plain/Text:  Password: Text: Output:  RC4( "24g3", "24z0") == nhnW  RC4( "24g3", "24z2") == nhnU  RC4( "5ybdt", "5ybu8") == XJrkp
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Based On:  Security issues of the IEEE 802.11b wireless LAN Boland, H.   Mousavi, H.    Carleton University, Ottawa, Ont., Canada IEEE Canadian Conference on Electrical and Computer Engineering, 2-5 May 2004
[object Object],[object Object],[object Object],[object Object],http://www.sreekanth.in [email_address] +91.9446384450
1 von 26

Recomendados

Wireless network security von
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
8.1K views29 Folien
Security Delivery Platform: Best practices von
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
923 views41 Folien
Wireless security von
Wireless securityWireless security
Wireless securityparipec
1.5K views34 Folien
Wireless Lan Security von
Wireless Lan SecurityWireless Lan Security
Wireless Lan SecuritySANDEEPONSLIDESHARE
1.3K views10 Folien
Security & Privacy in WLAN - A Primer and Case Study von
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
1.1K views63 Folien
Securing wireless network von
Securing wireless networkSecuring wireless network
Securing wireless networkSyed Ubaid Ali Jafri
726 views21 Folien

Más contenido relacionado

Was ist angesagt?

Wireless Device and Network level security von
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
1.7K views42 Folien
5169 wireless network_security_amine_k von
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
937 views47 Folien
Lecture 11 wifi security von
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
3.9K views53 Folien
Ch20 Wireless Security von
Ch20 Wireless SecurityCh20 Wireless Security
Ch20 Wireless Securityphanleson
620 views27 Folien
Wlan security von
Wlan securityWlan security
Wlan securityUpasona Roy
7.8K views23 Folien
Wi-Fi security – WEP, WPA and WPA2 von
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
4.4K views14 Folien

Was ist angesagt?(20)

Wireless Device and Network level security von Chetan Kumar S
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
Chetan Kumar S1.7K views
5169 wireless network_security_amine_k von Rama Krishna M
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
Rama Krishna M937 views
Lecture 11 wifi security von rajakhurram
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
rajakhurram3.9K views
Ch20 Wireless Security von phanleson
Ch20 Wireless SecurityCh20 Wireless Security
Ch20 Wireless Security
phanleson620 views
Wi-Fi security – WEP, WPA and WPA2 von Fábio Afonso
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
Fábio Afonso4.4K views
Wireless hacking and security von Adel Zalok
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
Adel Zalok2.4K views
Hacking Wireless Networks by Mandeep Singh Jadon von OWASP Delhi
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
OWASP Delhi1.2K views
Module 6 Wireless Network security von nikshaikh786
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
nikshaikh78687 views
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation von System ID Warehouse
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
System ID Warehouse1.4K views
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS von IJNSA Journal
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
IJNSA Journal41 views
Wlan networking and security von akki_hearts
Wlan networking and securityWlan networking and security
Wlan networking and security
akki_hearts580 views
Wlan security von Sajan Sahu
Wlan securityWlan security
Wlan security
Sajan Sahu3.9K views

Destacado

Emap expedite message authentication protocol for vehicular ad hoc networks von
Emap expedite message authentication protocol for vehicular ad hoc networksEmap expedite message authentication protocol for vehicular ad hoc networks
Emap expedite message authentication protocol for vehicular ad hoc networksIEEEFINALYEARPROJECTS
3.4K views6 Folien
HSTR Seminar von
HSTR SeminarHSTR Seminar
HSTR SeminarRonald Bartels
590 views87 Folien
Vanet by Sujata Tiwari von
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwarirahulpandey510
2.2K views24 Folien
wear fin seminar report von
wear fin seminar reportwear fin seminar report
wear fin seminar reportflobin
4.4K views15 Folien
Fin presentation von
Fin presentationFin presentation
Fin presentationamit gaur
5.1K views11 Folien
Securing the Cloud von
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
40.8K views19 Folien

Destacado(9)

Similar a Security Issues of 802.11b

Wifi Security von
Wifi SecurityWifi Security
Wifi SecurityShital Kat
2.4K views28 Folien
4 wifi security von
4 wifi security4 wifi security
4 wifi securityal-sari7
1.1K views27 Folien
Shashank wireless lans security von
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans securityShashank Srivastava
760 views26 Folien
Pentesting Your Own Wireless Networks, June 2011 Issue von
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
2.1K views35 Folien
Hacking Wireless Networks : Null Delhi (November) von
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Mandeep Jadon
1.3K views41 Folien
Chapter 7 - Wireless Network Security.pptx von
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
152 views28 Folien

Similar a Security Issues of 802.11b(20)

Wifi Security von Shital Kat
Wifi SecurityWifi Security
Wifi Security
Shital Kat2.4K views
4 wifi security von al-sari7
4 wifi security4 wifi security
4 wifi security
al-sari71.1K views
Pentesting Your Own Wireless Networks, June 2011 Issue von Ishan Girdhar
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar2.1K views
Hacking Wireless Networks : Null Delhi (November) von Mandeep Jadon
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
Mandeep Jadon1.3K views
Chapter 7 - Wireless Network Security.pptx von AmanuelZewdie4
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4152 views
Viable means using which Wireless Network Security can be Jeopardized von IRJET Journal
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
IRJET Journal28 views
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti... von Dr. Amarjeet Singh
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Wireless LAN Deployment Best Practices von Michael Boman
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
Michael Boman2.4K views
IJCER (www.ijceronline.com) International Journal of computational Engineerin... von ijceronline
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline196 views
Wireless Security von siDz
Wireless SecurityWireless Security
Wireless Security
siDz892 views
Wireless Security Needs For Enterprises von shrutisreddy
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy359 views
Research Inventy : International Journal of Engineering and Science von inventy
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy318 views
Sheetal - Wirelesss Hacking - ClubHack2008 von ClubHack
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
ClubHack1.3K views
謝續平 von 9577601
謝續平謝續平
謝續平
9577601484 views
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK von IJNSA Journal
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
IJNSA Journal104 views
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks von Chema Alonso
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Chema Alonso9.3K views

Último

STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf von
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdfDr. Jimmy Schwarzkopf
20 views29 Folien
Unit 1_Lecture 2_Physical Design of IoT.pdf von
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdfStephenTec
12 views36 Folien
The Research Portal of Catalonia: Growing more (information) & more (services) von
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
80 views25 Folien
Powerful Google developer tools for immediate impact! (2023-24) von
Powerful Google developer tools for immediate impact! (2023-24)Powerful Google developer tools for immediate impact! (2023-24)
Powerful Google developer tools for immediate impact! (2023-24)wesley chun
10 views38 Folien
NET Conf 2023 Recap von
NET Conf 2023 RecapNET Conf 2023 Recap
NET Conf 2023 RecapLee Richardson
10 views71 Folien
Scaling Knowledge Graph Architectures with AI von
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AIEnterprise Knowledge
38 views15 Folien

Último(20)

STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf von Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf von StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views
Powerful Google developer tools for immediate impact! (2023-24) von wesley chun
Powerful Google developer tools for immediate impact! (2023-24)Powerful Google developer tools for immediate impact! (2023-24)
Powerful Google developer tools for immediate impact! (2023-24)
wesley chun10 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows von Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software280 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc11 views
"Running students' code in isolation. The hard way", Yurii Holiuk von Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays17 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... von Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Business Analyst Series 2023 - Week 3 Session 5 von DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10300 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors von sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab21 views
Data Integrity for Banking and Financial Services von Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely25 views
Future of AR - Facebook Presentation von ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56115 views
HTTP headers that make your website go faster - devs.gent November 2023 von Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views

Security Issues of 802.11b

  • 1. Security Issues of IEEE 802.11b Wireless Local Area Networks Issues | Analysis | Suggestions | Solutions | Adaptations Seminar on Security Issues of 802.11b presented on 21-10-2008 by Sreekanth G S, 274, R7, Computer Science, Sree Chitra Thirunal College of Engineering
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.  
  • 25.
  • 26.