SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Wi-Fi Security
Prepaired By:
Virendra Singh Thakur
GTU PG School, Ahmeadabad
 Originally, Wi-Fi was a marketing term. The Wi-Fi
certified logo means that the product has passed
interoperability tests Currently Wi-Fi means wireless
networks in general
WHAT IS WIFI ?
Wireless networks are usually based on the IEEE 802.11
standards.
a. IEEE 802 series standards
a. 802.11 – wireless LANs
b. 802.15 – wireless personal area networks (e.g., Bluetooth)
c. 802.16 – wireless broadband up to 155Mb, wireless ISPs
b. 802.11a – 54 Mbps@5 GHz
a. Not interoperable with 802.11b
b. Limited distance
c. Dual-mode APs require 2 chipsets, look like two APs to
clients
d. Cisco products: Aironet 1200
CONTD…
a. 802.11b – 11 Mbps@2.4 GHz
a. Full speed up to 300 feet
b. Coverage up to 1750 feet
c. Cisco products: Aironet 340, 350, 1100, 1200
b. 802.11g – 54 Mbps@2.4 GHz
a. Same range as 802.11b
b. Backward-compatible with 802.11b
c. Speeds slower in dual-mode
d. Cisco products: Aironet 1100, 1200
• 802.11e – QoS
• Dubbed “Wireless MultiMedia (WMM)” by Wi-Fi Alliance
• 802.11i – Security
• Adds AES encryption
• Requires high cpu, new chips required
• TKIP is interim solution.
IEEE 802.11 standards. (Contd..)
CONTD…
a. 802.11n –(2009)
a. up to 300Mbps
b. 5Ghz and/or 2.4Ghz
c. ~230ft range
b. 802.11ac – (under development)
a. Will provide high through put in the 5 GHz band
b. Will use wider RF bandwidth
c. will enable multi-station WLAN throughput of at
least 1 Gbps
d. a maximum single link throughput of at least 500
Mbps
WIRELESS NETWORK MODES
• The 802.11 wireless networks operate in two basic
modes:
• Infrastructure mode
• Ad-hoc mode
• Infrastructure mode:
• each wireless client connects directly to a central device
called Access Point (AP)
• no direct connection between wireless clients
• AP acts as a wireless hub that performs the connections and
handles them between wireless clients
CONTD..
• Ad-hoc mode:
• Each wireless client connects directly with each other
• No central device managing the connections
• Rapid deployment of a temporal network where no
infrastructures exist (advantage in case of disaster…)
• Each node must maintain its proper authentication list.
Wi-Fi Security Techniques
• Wired Equivalent Privacy (WEP)
• Wireless Protected Access (WPA)
• Wireless Protected Access2 (WPA2)
WIRED EQUIVALENT PRIVACY (WEP)
• Short for Wired Equivalent Privacy, a security protocol for
wireless local area networks (WLANs) defined in the 802.11b
standard. WEP is designed to provide the same level of
security as that of a wired LAN.
• WEP aims to provide security by encrypting data over radio
waves so that it is protected as it is transmitted from one end
point to another. However, it has been found that WEP is not
as secure as once believed. WEP is used at the two lowest
layers of the OSI model - the data link and physical layers; it
therefore does not offer end-to-end security.
1.Appends a 32-bit CRC checksum to each outgoing frame (INTEGRITY)
2.Encrypts the frame using RC4 stream cipher = 40-bit (standard) or 104-bit
(Enhanced) message keys + a 24-bit IV random initialization vector
(CONFIDENTIALITY).
3.The Initialization Vector (IV) and default key on the station access point are
used to create a key stream
4.The key stream is then used to convert the plain text message into the WEP
encrypted frame.
Wired Equivalent Privacy (WEP) Contd..
Wired Equivalent Privacy (WEP) Contd..
• Short for Wi-Fi Protected Access, a Wi-Fi standard that was
designed to improve upon the security features of WEP. The
technology is designed to work with existing Wi-Fi products that
have been enabled with WEP (i.e., as a software upgrade to existing
hardware), but the technology includes two improvements over
WEP:
WPA - WI-FI PROTECTED ACCESS
New technique in 2002
replacement of security flaws of WEP.
Improved data encryption
Strong user authentication
Because of many attacks related to static key, WPA
minimize shared secret key in accordance with the frame
transmission.
Use the RC4 algorithm in a proper way and provide fast
transfer of the data before someone can decrypt the data.
WPA - WI-FI PROTECTED ACCESS
Data is encrypted using the RC4 stream cipher, with a 128-bit key and
a 48-bit initialization vector (IV).
One major improvement in WPA over WEP is the Temporal Key
Integrity Protocol (TKIP), which dynamically changes keys as the
system is used.
When combined with the much larger IV, this defeats the well-known
key recovery attacks on WEP.
WPA also provides vastly improved payload integrity.
WPA - WI-FI PROTECTED ACCESS
WPA2 - WI-FI PROTECTED ACCESS 2
• Based on the IEEE 802.i standard
• 2 versions: Personal & Enterprise
• The primary enhancement over WPA is the use of the AES (Advanced
Encryption Standard) algorithm
• The encryption in WPA2 is done by utilizing either AES or TKIP
• The Personal mode uses a PSK (Pre-shared key) & does not require a
separate authentication of users
• The enterprise mode requires the users to be separately authenticated
by using the EAP protocol
WPA2 - WI-FI PROTECTED ACCESS 2
WPA uses AES with a key length of 128 bit to encrypt the data
The AES uses the Counter-Mode/CBC-MAC Protocol (CCMP)
The CCMP uses the same key for both encryption and authentication,
but with different initialization vectors.
• WPA2 has immunity against many types of hacker attacks
• Man-in-the middle
• Authentication forging
• Replay
• Key collision
• Weak keys
• Packet forging
• Dictionary attacks
WPA2 - WI-FI PROTECTED ACCESS 2
WEP VS WPA VS WPA2
WEP WPA WPA2
ENCRYPTION RC4 RC4 AES
KEY ROTATION NONE Dynamic
Session Keys
Dynamic Session
Keys
KEY
DISTRIBUTION
Manually typed
into each device
Automatic
distribution
available
Automatic
distribution
available
AUTHENTICATION Uses WEP key as
Authentication
Can use 802.1x
& EAP
Can use 802.1x &
EAP
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacksHuda Seyam
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
WiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beWiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beBryan Len
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
IEEE 802.11 wifi
IEEE 802.11 wifiIEEE 802.11 wifi
IEEE 802.11 wifiParnal Vast
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?Tom Isaacson
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 

Was ist angesagt? (20)

WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
 
WPA 3
WPA 3WPA 3
WPA 3
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and DragonflyWPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
WiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11beWiFi 7 Training, Improved Latency, Introduction to 802.11be
WiFi 7 Training, Improved Latency, Introduction to 802.11be
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
IEEE 802.11 wifi
IEEE 802.11 wifiIEEE 802.11 wifi
IEEE 802.11 wifi
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 

Ähnlich wie Wi fi security

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan finalPREMKUMAR
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringeceb9198
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 

Ähnlich wie Wi fi security (20)

Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 

Mehr von Virendra Thakur

Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”Virendra Thakur
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Virendra Thakur
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration ManagementVirendra Thakur
 

Mehr von Virendra Thakur (6)

Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Software Configuration Management
Software Configuration ManagementSoftware Configuration Management
Software Configuration Management
 
Touch id in iphone 5s
Touch id in iphone 5sTouch id in iphone 5s
Touch id in iphone 5s
 

Kürzlich hochgeladen

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Wi fi security

  • 1. Wi-Fi Security Prepaired By: Virendra Singh Thakur GTU PG School, Ahmeadabad
  • 2.  Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests Currently Wi-Fi means wireless networks in general WHAT IS WIFI ?
  • 3. Wireless networks are usually based on the IEEE 802.11 standards. a. IEEE 802 series standards a. 802.11 – wireless LANs b. 802.15 – wireless personal area networks (e.g., Bluetooth) c. 802.16 – wireless broadband up to 155Mb, wireless ISPs b. 802.11a – 54 Mbps@5 GHz a. Not interoperable with 802.11b b. Limited distance c. Dual-mode APs require 2 chipsets, look like two APs to clients d. Cisco products: Aironet 1200
  • 4. CONTD… a. 802.11b – 11 Mbps@2.4 GHz a. Full speed up to 300 feet b. Coverage up to 1750 feet c. Cisco products: Aironet 340, 350, 1100, 1200 b. 802.11g – 54 Mbps@2.4 GHz a. Same range as 802.11b b. Backward-compatible with 802.11b c. Speeds slower in dual-mode d. Cisco products: Aironet 1100, 1200
  • 5. • 802.11e – QoS • Dubbed “Wireless MultiMedia (WMM)” by Wi-Fi Alliance • 802.11i – Security • Adds AES encryption • Requires high cpu, new chips required • TKIP is interim solution. IEEE 802.11 standards. (Contd..)
  • 6. CONTD… a. 802.11n –(2009) a. up to 300Mbps b. 5Ghz and/or 2.4Ghz c. ~230ft range b. 802.11ac – (under development) a. Will provide high through put in the 5 GHz band b. Will use wider RF bandwidth c. will enable multi-station WLAN throughput of at least 1 Gbps d. a maximum single link throughput of at least 500 Mbps
  • 7. WIRELESS NETWORK MODES • The 802.11 wireless networks operate in two basic modes: • Infrastructure mode • Ad-hoc mode • Infrastructure mode: • each wireless client connects directly to a central device called Access Point (AP) • no direct connection between wireless clients • AP acts as a wireless hub that performs the connections and handles them between wireless clients
  • 8. CONTD.. • Ad-hoc mode: • Each wireless client connects directly with each other • No central device managing the connections • Rapid deployment of a temporal network where no infrastructures exist (advantage in case of disaster…) • Each node must maintain its proper authentication list.
  • 9. Wi-Fi Security Techniques • Wired Equivalent Privacy (WEP) • Wireless Protected Access (WPA) • Wireless Protected Access2 (WPA2)
  • 10. WIRED EQUIVALENT PRIVACY (WEP) • Short for Wired Equivalent Privacy, a security protocol for wireless local area networks (WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of security as that of a wired LAN. • WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not as secure as once believed. WEP is used at the two lowest layers of the OSI model - the data link and physical layers; it therefore does not offer end-to-end security.
  • 11. 1.Appends a 32-bit CRC checksum to each outgoing frame (INTEGRITY) 2.Encrypts the frame using RC4 stream cipher = 40-bit (standard) or 104-bit (Enhanced) message keys + a 24-bit IV random initialization vector (CONFIDENTIALITY). 3.The Initialization Vector (IV) and default key on the station access point are used to create a key stream 4.The key stream is then used to convert the plain text message into the WEP encrypted frame. Wired Equivalent Privacy (WEP) Contd..
  • 12. Wired Equivalent Privacy (WEP) Contd..
  • 13. • Short for Wi-Fi Protected Access, a Wi-Fi standard that was designed to improve upon the security features of WEP. The technology is designed to work with existing Wi-Fi products that have been enabled with WEP (i.e., as a software upgrade to existing hardware), but the technology includes two improvements over WEP: WPA - WI-FI PROTECTED ACCESS
  • 14. New technique in 2002 replacement of security flaws of WEP. Improved data encryption Strong user authentication Because of many attacks related to static key, WPA minimize shared secret key in accordance with the frame transmission. Use the RC4 algorithm in a proper way and provide fast transfer of the data before someone can decrypt the data. WPA - WI-FI PROTECTED ACCESS
  • 15. Data is encrypted using the RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV). One major improvement in WPA over WEP is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used. When combined with the much larger IV, this defeats the well-known key recovery attacks on WEP. WPA also provides vastly improved payload integrity. WPA - WI-FI PROTECTED ACCESS
  • 16. WPA2 - WI-FI PROTECTED ACCESS 2 • Based on the IEEE 802.i standard • 2 versions: Personal & Enterprise • The primary enhancement over WPA is the use of the AES (Advanced Encryption Standard) algorithm • The encryption in WPA2 is done by utilizing either AES or TKIP • The Personal mode uses a PSK (Pre-shared key) & does not require a separate authentication of users • The enterprise mode requires the users to be separately authenticated by using the EAP protocol
  • 17. WPA2 - WI-FI PROTECTED ACCESS 2 WPA uses AES with a key length of 128 bit to encrypt the data The AES uses the Counter-Mode/CBC-MAC Protocol (CCMP) The CCMP uses the same key for both encryption and authentication, but with different initialization vectors.
  • 18. • WPA2 has immunity against many types of hacker attacks • Man-in-the middle • Authentication forging • Replay • Key collision • Weak keys • Packet forging • Dictionary attacks WPA2 - WI-FI PROTECTED ACCESS 2
  • 19. WEP VS WPA VS WPA2 WEP WPA WPA2 ENCRYPTION RC4 RC4 AES KEY ROTATION NONE Dynamic Session Keys Dynamic Session Keys KEY DISTRIBUTION Manually typed into each device Automatic distribution available Automatic distribution available AUTHENTICATION Uses WEP key as Authentication Can use 802.1x & EAP Can use 802.1x & EAP