SlideShare a Scribd company logo
Wireless Network SecurityThomas LiuMorgan Quirk1
IntroductionWireless NetworkBSSID: cs440xWEP Open Key: BEEFFACADEhttp://thomas/2
Today’s Topics3Wireless vs. WiredWireless security concernsWhy WEP is AwfulWhy WPA is Less AwfulGood Wireless Practices
Wireless vs. Wired4Packet SniffingRemote AccessMultiple targetsEase of Use
Wireless Security Concerns5Man in the middle attacksAccidental/Malicious associationAd-hoc networksDenial of serviceUnauthorized network access
Attacker Incentive6Free internet![Industrial] espionageGeneral maliceFun and profit
Wired Equivalent Privacy7Wireless security as good as having a wire!Turns out it isn’t so great.Introduced in 1997Deprecated in 2004Still widely used
WEP Encryption8
Cracking WEP9Sniff the air for packetsLook for IV collisionsUse statistical analysisNot enough packets?De-authentication attackReplay attacksChop-chop
Wi-Fi Protected Access / TKIP10WEP replacement without replacing legacy hardwareSoon to be deprecatedTKIP – Temporal Key ProtocolMixes IV and Key instead of simple concatenationUses sequence numbers to prevent replay attacksMessage integrity checkIEEE standard for WPA requires handshakingGenerates a session key to be used in packet encryption
TKIP Encryption11
TKIP: It fixes things, but it could be better12Still vulnerable to Chop-chop, but it takes longer.QoS packet injection
AES – Advanced Encryption Standard13Adopted by the U.S. government15 competing designs, won by RijndaelReplaces parts of TKIP/WEP
The AES Process14Key ExpansionAdd Round KeyPer round:Byte SubstitutionShift RowsMix ColumnsAdd Round KeyFinal RoundListen, it’s complicated.http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
Best Practices15Use good encryptionMAC FilteringStatic IPsNetwork separationPolicy
Questions?16

More Related Content

PPTX
Wireless Security null seminar
PPT
Wifi Security
PDF
Wireless Networking Security
PPT
Wlan security
PPTX
Wireless network security
PDF
Wi-Fi security – WEP, WPA and WPA2
PPTX
Wireless network security
PPTX
WiFi Secuiry: Attack & Defence
Wireless Security null seminar
Wifi Security
Wireless Networking Security
Wlan security
Wireless network security
Wi-Fi security – WEP, WPA and WPA2
Wireless network security
WiFi Secuiry: Attack & Defence

What's hot (20)

PPTX
Wi Fi Security
PPT
Wireless security presentation
PPTX
Wlan security
PDF
Wi-fi Hacking
PPTX
Wifi Security
PPT
Wireless LAN security
PPTX
PPTX
PPTX
Wi-Fi Technology
PPTX
Fundamentals of Network security
PPTX
WPA 3
PDF
LTE :Mobile Network Security
PPTX
Wireless network
PPT
Ch06 Wireless Network Security
PDF
Network Security Fundamentals
PDF
Chapter Two.pdf
PPTX
Wifi ppt
PDF
14 palo alto quality of service(qos) concept
PPTX
Introduction of firewall slides
Wi Fi Security
Wireless security presentation
Wlan security
Wi-fi Hacking
Wifi Security
Wireless LAN security
Wi-Fi Technology
Fundamentals of Network security
WPA 3
LTE :Mobile Network Security
Wireless network
Ch06 Wireless Network Security
Network Security Fundamentals
Chapter Two.pdf
Wifi ppt
14 palo alto quality of service(qos) concept
Introduction of firewall slides
Ad

Viewers also liked (15)

PPSX
Wireless Network Security
PPT
Securing wireless network
PDF
Pentesting Wireless Networks and Wireless Network Security
PPTX
Wireless network security
PPTX
Hp Fortify Mobile Application Security
PPT
5169 wireless network_security_amine_k
PPTX
Mobile Application Security
PDF
Kablosuz Ağlar ve Güvenlik Riskleri
PDF
Cisco project ideas
PDF
Wireless LAN Security, Policy, and Deployment Best Practices
PPT
IEEE 802.11
PPT
Wireless networking
PPTX
Cloud security ppt
PPTX
Wireless communication
PPT
Network security
Wireless Network Security
Securing wireless network
Pentesting Wireless Networks and Wireless Network Security
Wireless network security
Hp Fortify Mobile Application Security
5169 wireless network_security_amine_k
Mobile Application Security
Kablosuz Ağlar ve Güvenlik Riskleri
Cisco project ideas
Wireless LAN Security, Policy, and Deployment Best Practices
IEEE 802.11
Wireless networking
Cloud security ppt
Wireless communication
Network security
Ad

Similar to Wireless Network Security (20)

PDF
A Comparitive Analysis of Wireless Security Protocols (WEP And WPA2)
PDF
A comparitive analysis of wireless security protocols (wep and wpa2)
PPT
wireless security ppt by david wagner UCB
PPTX
A framework for securing wireless home networks 1
PPTX
Wireless Security
PDF
Viable means using which Wireless Network Security can be Jeopardized
PPT
chapter 7 -wireless network security.ppt
PPTX
WLAN Attacks and Protection
PPTX
Module 6 Wireless Network security
PDF
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
PPTX
Wireless security
PDF
Analysis Of Security In Wireless Network
PPT
Shashank wireless lans security
PPT
null Pune meet - Wireless Security
PPTX
A Survey On Wireless security
PDF
Cit877[1]
PPT
Security Issues of 802.11b
PPT
Security Issues of IEEE 802.11b
PPTX
Wpa2 psk security measure
PPTX
Unit 5 presentation
A Comparitive Analysis of Wireless Security Protocols (WEP And WPA2)
A comparitive analysis of wireless security protocols (wep and wpa2)
wireless security ppt by david wagner UCB
A framework for securing wireless home networks 1
Wireless Security
Viable means using which Wireless Network Security can be Jeopardized
chapter 7 -wireless network security.ppt
WLAN Attacks and Protection
Module 6 Wireless Network security
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Wireless security
Analysis Of Security In Wireless Network
Shashank wireless lans security
null Pune meet - Wireless Security
A Survey On Wireless security
Cit877[1]
Security Issues of 802.11b
Security Issues of IEEE 802.11b
Wpa2 psk security measure
Unit 5 presentation

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Approach and Philosophy of On baking technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Big Data Technologies - Introduction.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
sap open course for s4hana steps from ECC to s4
Approach and Philosophy of On baking technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Big Data Technologies - Introduction.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Chapter 3 Spatial Domain Image Processing.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A comparative analysis of optical character recognition models for extracting...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25-Week II
Network Security Unit 5.pdf for BCA BBA.
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Wireless Network Security