SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wired Equivalent Privacy (WEP)
Security Awareness: Applying Practical Security in Your World
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Wireless Networking and Security
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
A History of WEP The Ups and Downs of Wireless Security.
Wireless Networks Tamus, Zoltán Ádám
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
WEP Protocol Weaknesses and Vulnerabilities
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
WIFI. What is wifi ? Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Wireless Networking & Security Greg Stabler Spencer Smith.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Components of wireless LAN & Its connection to the Internet
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Chapter 5 LANs and WLANs.
TERMINOLOGY Define: WPAN
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Protocols WEP, WPA & WPA2.
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
A Wireless LAN Security Protocol
Wireless Local Area Network (WLAN)
How To Set Up A Wireless Network
Wireless LAN Security 4.3 Wireless LAN Security.
Wi-Fi Technology.
Security Issues with Wireless Protocols
Presentation transcript:

SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University

What is a Wireless LAN A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread spectrum or OFDM radio), and usually providing a connection through an access point to the wider Internet. This gives users the mobility to move around within a local coverage area and still be connected to the network.

Basic Structure of A wireless LAN (Diagram from creatively.com)

Components of A Wireless LAN Access Point or Wireless Router Wireless Network Cards Wireless Bridges Broadband Modem

How does Wireless LAN work Wireless LAN uses a radio frequency, a frequency within the electromagnetic spectrum associated with radio wave propagation. When a radio frequency current is supplied to an antenna, an electromagnetic field is created which is able to propagate through space. With the aid of a WLAN access point, you can obtain access to the local network and to the Internet.

What could Possibly go wrong Deceptive Access Points Denial of Service Passive Capturing/Eavesdropping Illicit Entry

How can A WLAN be Secured To secure your wireless LAN, one must employ data encryption technology. There are also common best practices to be employed by users to secure their wireless LANS.

BASIC DATA ENCRYPTION TECHNIQUES AVAILABLE Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Wi-Fi Protected Access version 2 (WPA2) What is WEP? It is the original encryption protocol developed for wireless networks. WEP was created to provide the same level of security as wired networks.

Loop Holes in WEP Passive attacks used to decrypt packets based on statistical analysis. Active attack to inject new packets from unauthorized mobile stations, based on known plaintext message. Active attacks to decrypt packets, based on tricking the access point. Dictionary-building attack that, after analysis of about a days worth of traffic, this allows real-time automated decryption of all packets.

What is WPA WPA ( Wi Fi protected access) is a security certification for wireless computers that is designed to provide significantly stronger wireless data encryption than WEP, but they use the same hardware as the one of WEP. The devise software is just simply updated to WPA.

Is WPA Secure? WPA itself is reasonably secure. The passphrase can only be broken through brute force, so its only prone to hacking if you chose a weak single-word passphrase. It was never actually meant as a standard but just a quick fix until WPA2 became available. It uses TKIP, two know attacks against TKIP are Beck-Tews attack Ohigashi-Morii attack The only known attack against WPA is brute forcing the WPA key.

What is WPA2 WPA2 is a second, newer version of wireless protected access (WPA)security and access control technology for wireless networking. It replaces TKIP with CCMP and fixes the security issues of WPA So far it is the best wi fi protection mechanism from the THREE listed.

BEST PRACTICES IN SECURING WLANS Administrator Username and Password should be changed Immediately. Your WLAN identity should not be broadcast. Use WPA2 encryption to secure communication between your hosts and your wireless access point. Configure your wireless access point to accept only Mac Addresses of computers you own. Position your wireless router to reduce leakage. Turn off your wireless network when you are not using it for a long period of time.