SlideShare a Scribd company logo
6
Most read
7
Most read
Authentication for Wireless Network



 Project Presentation by:

 Aman Chaurasia
 SJSU ID: 008017516




05/10/12                                         1
Contents:

   Wireless network and possible threat.



   Methods of Security.



   Authentication protocol (EAP-TLS) [1]




05/10/12                                    2
What is Internet?




                  Figure 1: Internet Topology [1]

05/10/12                                            3
Why Authentication?
    Advantages:
   Scalability and Mobility.
   Reduced cost of ownership.
   Installation speed and simplicity.

    Wireless Threats:
   War-driving.
   Unknown Access-Point.
   Denial of service attack (DoS).




05/10/12                                 4
Terminology:
    SSID, Beacon, Probe frame.

 Certificate:
- It is used to authenticate the website.
                                            Figure 2: Wireless Frames[1]
- Issued by Certificate Authority.
  (VeriSign, Entrust)

 RADUIS (Remote Authentication Dial-In User Service):
- AAA and employed by ISPs, web servers, wireless networks and
  AP [1].



    05/10/12                                                               5
Authentication Protocol: EAP-TLS




05/10/12
                 Figure 3: EAP-TLS [2][5][7][8]   6
Other Authentication Protocol:

   EAP – FAST: Flexible Authentication, Secure tunneling.
-   PAC , No Certificates.

   Protected EAP (PEAP): Certificate with Server only.
-   No client authentication.

 Lightweight EAP (LEAP): Username/Password.
- Not recommended anymore.




05/10/12                                                     7
The future – long term:
   IEEE is working on 802.11i.
-   Replacement of WEP (by WPA2).
-   Uses AES.
-   Expected ratifications by 2016 end.




    05/10/12                              8
Reference:
1. CCNA Wireless guide, Todd Lammle- page 157-178.
2. http://www.youtube.com/watch?v=JgJnVuG-OZI (EAP-TLS).


  Bibliography:
3. CCNA Wireless guide by Todd Lammle.
4. Data communication and Networking, 4E, by Behrouz A. Forouzan.
5. Computer Networks by Ross & Kurose.
6. http://en.wikipedia.org/wiki/Authentication#History_and_state-of-the-art
7. http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol
8. http://www.youtube.com/watch?v=pPfwemHBblk
9. http://www.intel.com/support/wireless/wlan/sb/CS-025307.htm
10. http://en.wikipedia.org/wiki/IEEE_802.11 (protocol section)


 05/10/12                                                                9
Any Questions?

                Thank You…




05/10/12                     10

More Related Content

PPT
Introduction to Layer 2 switching
PPTX
Hotspot 2.0 - Concept and Challenges
PPTX
UNIT - II.5g technologies wireless propogation channels
PPT
Virtual Private Network
PPTX
Zigbee technology
PPTX
Gi-Fi ppt
PPTX
Tcp and udp ports
PPTX
Subnetting
Introduction to Layer 2 switching
Hotspot 2.0 - Concept and Challenges
UNIT - II.5g technologies wireless propogation channels
Virtual Private Network
Zigbee technology
Gi-Fi ppt
Tcp and udp ports
Subnetting

What's hot (20)

PPTX
VOIP Presentation
PPTX
The Halo Network
PPTX
PPT
Lan Topology
PPTX
Types of VPN
PPTX
5 g technology
PPT
Huaweinetworkicondatabasev2 130509181727-phpapp02
PDF
lifi technology
PPTX
PDF
5G network architecture progress
PDF
The essential role of AI in the 5G future
PPT
CCNA Security - Chapter 5
PPTX
ppt on LIFI TECHNOLOGY
PDF
IoT Fundamentals.pdf
PPT
Atm( Asynchronous Transfer mode )
PPTX
5G the Future of next Generation of communication
PDF
Understanding Cisco’ Next Generation SD-WAN Technology
PPTX
6th Generation of network Architecture (6G)
PPTX
5G Technology - History of Wireless Technology
PPTX
5 g wireless technology
VOIP Presentation
The Halo Network
Lan Topology
Types of VPN
5 g technology
Huaweinetworkicondatabasev2 130509181727-phpapp02
lifi technology
5G network architecture progress
The essential role of AI in the 5G future
CCNA Security - Chapter 5
ppt on LIFI TECHNOLOGY
IoT Fundamentals.pdf
Atm( Asynchronous Transfer mode )
5G the Future of next Generation of communication
Understanding Cisco’ Next Generation SD-WAN Technology
6th Generation of network Architecture (6G)
5G Technology - History of Wireless Technology
5 g wireless technology
Ad

Viewers also liked (20)

PPT
Authentication in wireless - Security in Wireless Protocols
PPT
Mutual Authentication For Wireless Communication
PPT
Network security
PPT
Authentication in Wireless Networks
PPTX
Improved EAP-SRP in Wireless Network Authentication
PPTX
Northridge Consulting Group Case Project
PDF
Wireless+LAN+Technology+and+Security+Vulnerabilities
PDF
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
PDF
five fundamental questions in economics
PPTX
WiMAX Network Security
PPT
Wlan security
PPTX
Wireless local area netwok slide
PPT
graphical password authentication
PPTX
Types of network
PPT
Wireless network ppt
PPTX
Three types of wireless technology
PPTX
Wireless Network Presentation
PPT
Wireless networking
PPTX
Hop by-hop authentication and source privacy in wireless sensor networks
PDF
Network Security Presentation
Authentication in wireless - Security in Wireless Protocols
Mutual Authentication For Wireless Communication
Network security
Authentication in Wireless Networks
Improved EAP-SRP in Wireless Network Authentication
Northridge Consulting Group Case Project
Wireless+LAN+Technology+and+Security+Vulnerabilities
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
five fundamental questions in economics
WiMAX Network Security
Wlan security
Wireless local area netwok slide
graphical password authentication
Types of network
Wireless network ppt
Three types of wireless technology
Wireless Network Presentation
Wireless networking
Hop by-hop authentication and source privacy in wireless sensor networks
Network Security Presentation
Ad

Similar to Wireless authentication (20)

PDF
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
PDF
1 EAP and 802.1X are usually associated with aRADIUS server2To.pdf
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
PDF
Pentesting Your Own Wireless Networks, June 2011 Issue
PDF
IEEE 802.1X and Axis’ Implementation
PPT
Owasp Forum Web Services Security
PPTX
Building Up Network Security: An Introduction
DOC
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
PDF
Airheads vail 2011 pci 2.0 compliance
PDF
Basic Network Support Certification
PPT
Introdutction – Security & Authentication in WLAN
PPT
E Snet Raf Essc Jan2005
PDF
Virtual private networks
PDF
SIPNOC 2014 - Is It Time For TLS for SIP?
PDF
A Review on security issues in WiMAX
PDF
Wireless Security Architecture Designing and Maintaining Secure Wireless for ...
PDF
Wi-Fi Roaming Security and Privacy
PDF
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
PDF
Security Analysis and Improvement for IEEE 802.11i
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
1 EAP and 802.1X are usually associated with aRADIUS server2To.pdf
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Pentesting Your Own Wireless Networks, June 2011 Issue
IEEE 802.1X and Axis’ Implementation
Owasp Forum Web Services Security
Building Up Network Security: An Introduction
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Airheads vail 2011 pci 2.0 compliance
Basic Network Support Certification
Introdutction – Security & Authentication in WLAN
E Snet Raf Essc Jan2005
Virtual private networks
SIPNOC 2014 - Is It Time For TLS for SIP?
A Review on security issues in WiMAX
Wireless Security Architecture Designing and Maintaining Secure Wireless for ...
Wi-Fi Roaming Security and Privacy
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Security Analysis and Improvement for IEEE 802.11i

Recently uploaded (20)

PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
IGGE1 Understanding the Self1234567891011
PDF
HVAC Specification 2024 according to central public works department
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Computing-Curriculum for Schools in Ghana
PDF
advance database management system book.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
Hazard Identification & Risk Assessment .pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Indian roads congress 037 - 2012 Flexible pavement
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chinmaya Tiranga quiz Grand Finale.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
IGGE1 Understanding the Self1234567891011
HVAC Specification 2024 according to central public works department
Unit 4 Computer Architecture Multicore Processor.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Weekly quiz Compilation Jan -July 25.pdf
What if we spent less time fighting change, and more time building what’s rig...
Paper A Mock Exam 9_ Attempt review.pdf.
1_English_Language_Set_2.pdf probationary
Computer Architecture Input Output Memory.pptx
Introduction to pro and eukaryotes and differences.pptx
Computing-Curriculum for Schools in Ghana
advance database management system book.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Hazard Identification & Risk Assessment .pdf

Wireless authentication

  • 1. Authentication for Wireless Network Project Presentation by: Aman Chaurasia SJSU ID: 008017516 05/10/12 1
  • 2. Contents:  Wireless network and possible threat.  Methods of Security.  Authentication protocol (EAP-TLS) [1] 05/10/12 2
  • 3. What is Internet? Figure 1: Internet Topology [1] 05/10/12 3
  • 4. Why Authentication? Advantages:  Scalability and Mobility.  Reduced cost of ownership.  Installation speed and simplicity. Wireless Threats:  War-driving.  Unknown Access-Point.  Denial of service attack (DoS). 05/10/12 4
  • 5. Terminology:  SSID, Beacon, Probe frame.  Certificate: - It is used to authenticate the website. Figure 2: Wireless Frames[1] - Issued by Certificate Authority. (VeriSign, Entrust)  RADUIS (Remote Authentication Dial-In User Service): - AAA and employed by ISPs, web servers, wireless networks and AP [1]. 05/10/12 5
  • 6. Authentication Protocol: EAP-TLS 05/10/12 Figure 3: EAP-TLS [2][5][7][8] 6
  • 7. Other Authentication Protocol:  EAP – FAST: Flexible Authentication, Secure tunneling. - PAC , No Certificates.  Protected EAP (PEAP): Certificate with Server only. - No client authentication.  Lightweight EAP (LEAP): Username/Password. - Not recommended anymore. 05/10/12 7
  • 8. The future – long term:  IEEE is working on 802.11i. - Replacement of WEP (by WPA2). - Uses AES. - Expected ratifications by 2016 end. 05/10/12 8
  • 9. Reference: 1. CCNA Wireless guide, Todd Lammle- page 157-178. 2. http://www.youtube.com/watch?v=JgJnVuG-OZI (EAP-TLS). Bibliography: 3. CCNA Wireless guide by Todd Lammle. 4. Data communication and Networking, 4E, by Behrouz A. Forouzan. 5. Computer Networks by Ross & Kurose. 6. http://en.wikipedia.org/wiki/Authentication#History_and_state-of-the-art 7. http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol 8. http://www.youtube.com/watch?v=pPfwemHBblk 9. http://www.intel.com/support/wireless/wlan/sb/CS-025307.htm 10. http://en.wikipedia.org/wiki/IEEE_802.11 (protocol section) 05/10/12 9
  • 10. Any Questions? Thank You… 05/10/12 10