A Wireless LAN Security Protocol

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
WEP Protocol Weaknesses and Vulnerabilities
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Network System Security - Task 2. Russell Johnston.
Understand Wireless Security LESSON Security Fundamentals.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Module 48 (Wireless Hacking)
Re-evaluating the WPA2 Security Protocol
CompTIA Security+ Study Guide (SY0-401)
CS1: Wireless Communication and Mobile Programming
Cryptography: an overview
OSA vs WEP WPA and WPA II Tools for hacking
Instructor Materials Chapter 6 Building a Home Network
Wireless Protocols WEP, WPA & WPA2.
Security in the layers 8: Network Security.
Wireless Security.
Methods of Securing LANs
Computer Communication & Networks
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
Cryptographic Hash Function
Visit for more Learning Resources
Presented by: Dr. Munam Ali Shah
Security of a Local Area Network
Wireless Fidelity (15881A0515).
COMPUTER PRIVACY.
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
Wireless Network Security
Chapter 05 BẢO MẬT TRONG HỆ THỐNG WLAN
The Secure Sockets Layer (SSL) Protocol
Cryptography: an overview
WLAN Security Antti Miettinen.
Security Risanuri Hidayat 21 February 2019 security.
Security Issues with Wireless Protocols
One-way Hash Function Network Security.
Presentation transcript:

A Wireless LAN Security Protocol CTP/CURTIN/2011/GROUP 29

Group Members DCN09C4-0808 D.M.N.Dissanayake

Why WLAN Security? Intruders who try to attack the computers Rogue AP Soft AP MAC spoofing Denial of Service The communication between server and client of a WLAN can be hacked by an intruder.

Security Requirments Confidentiality -Messages sent must be encrypted Authentication -Origin of message received must be verified Integrity -Integrity of messages received must be verified Access Control -Access for legitimate entities only

Available Protocols WPE (Wired Equivalent Privacy) WPA (Wi-Fi Protected Access) WPA2 TKIP (Temporal Key Integrity Protocol)

New Protocol Client generate a session key. User Inputs a key Hashes are generated for both the keys. The user-input key is encrypted with the time key and the time key is encrypted with a hard-coded key.

New Protocol cont… Client sends the hashes and encrypted passwords to server through an access point Server decrypts keys Server generates hashes for the decrypted keys and compares them with the hashes If all is good, further communication is done using same user key.

New Protocol cont… If there is a failure, the session is terminated. The client sends “exit” command, and the session is terminated.

Block Diagram

Time Plan

Advantages of this protocol… User may be able use a very interact with other computers more securely.

Thank You