Security Issues with Wireless Protocols

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Filtering and Security By Mohammad Shanehsaz June 2004.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security flaws of the WEP-Protocol by Bastian Sopora, Seminar Computer Security 2006.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Wireless Privacy: Analysis of Security Nikita Borisov UC Berkeley
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
WLAN What is WLAN? Physical vs. Wireless LAN
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
A History of WEP The Ups and Downs of Wireless Security.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
Wireless Security Presented by: Amit Kumar Singh Instructor : Dr. T. Andrew Yang.
Wireless Encryption: WEP and cracking it. Eric Shea.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless Networking & Security Greg Stabler Spencer Smith.
 Process of converting readable data into unreadable characters to prevent unauthorized access. › Encrypt – make unreadable › Decrypt – make readable.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Intercepting Mobiles Communications: The Insecurity of ► Paper by Borisov, Goldberg, Wagner – Berkley – MobiCom 2001 ► Lecture by Danny Bickson.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Encryption Protocols used in Wireless Networks Derrick Grooms.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
WLAN Security1 Security of WLAN Máté Szalay
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
System Security: Cryptography Technologies CPE Operating Systems
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
Access Point Extender/bridge Radio card SSID - Service Set Identifier “An identifier attached to packets sent over the wireless LAN that functions as a.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
 Things you may not know…  Why should we be secure?  How to secure your computer  Security Types.
Understand Wireless Security LESSON Security Fundamentals.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Chapter 5 LANs and WLANs.
Re-evaluating the WPA2 Security Protocol
CompTIA Security+ Study Guide (SY0-401)
Wireless Protocols WEP, WPA & WPA2.
Wireless Security.
Lecture 29 Security in IEEE Dr. Ghalib A. Shah
WEP & WPA Mandy Kershishnik.
Securing A Wireless Network
A Wireless LAN Security Protocol
Wireless Security Ian Bodley.
Wireless Privacy: Analysis of Security
IEEE i Dohwan Kim.
Wireless Network Security
Intercepting Mobile Communications: The Insecurity of
Presentation transcript:

Security Issues with Wireless Protocols Kent Strawcutter

WEP Wired Equivalent Privacy (WEP) is a deprecated algorithm to secure 802.11 wireless networks. WEP uses radio transmission and is susceptible to eavesdropping. When introduced in 1999, WEP was intended to provide comparable security to a wired network. Was cracked within minutes in 2001 with standard hardware

WEP Issues Passive attacks to decrypt traffic based on statistical analysis. - attacker intercepts traffic and waits for IV collisions, collecting enough to decrypt all packets

WEP Issues Active attack to inject new traffic from unauthorized mobile stations, based on known plaintext. - attacker constructs correctly encrypted packets from known plain text for one encrypted packet

WEP Issues Active attacks to decrypt traffic, based on tricking the access point. - attacker transforms the destination IP to a machine he controls

WEP Issues Dictionary-building attack that, after analysis of about a day's worth of traffic, allows real-time automated decryption of all traffic.

WPA Wi-Fi Protected Access Implemented in response to WEP security flaws Designed to work with pre-WPA network cards Introduced in 2003

WPA The passphrase may be from 8 to 63 printable ASCII characters or 64 hexadecimal digits (256 bits) Simple passphrases may be cracked

WPA2 Introduced in 2004 Strong encryption and authentication support for infrastructure and ad-hoc networks (WPA is limited to infrastructure networks)

WPA2 WPA2 - Personal protects unauthorized network access by utilizing a set-up password. WPA2 - Enterprise verifies network users through a server. WPA2 is backward compatible with WPA