SlideShare a Scribd company logo
WEL-COME
Wireless security
Presented by:
Vinay. V. Chitrakathi
T.E. (C.S.E.)
Wireless Security: Risks and Solutions
Presented to:
Prof. A. D. Pathak
Seminar Guide
 Overview of Wireless Technology.
 Security and Privacy issues in Wireless Network.
 Wireless Security Protocols.
 Wireless Equivalent Privacy (WEP).
 Wireless Equivalent Privacy (WEP2).
 Wi-Fi Protected Access (WPA).
 Temporal Key Integrity Protocol (TKIP).
 WPA Pre Shared Key (WPA-PSK).
 Wi-Fi Protected Access (WPA2).
 Counter-Mode with CBC-MAC Protocol (CCMP).
 Wireless Network Threats.
 Traffic Analysis.
 Passive Eavesdropping.
 Active Eavesdropping.
 Unauthorized Access.
 Man-in-the-middle
 Session High-Jacking
 Replay
 Denial of service (DoS)
Contents
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service
names are the property of their respective owners. © Motorola, Inc. 2010. All rights reserved.
5
INTERNET
Server
Network Edge
Blurred
New Attack
Vectors ‘Behind’
the Firewall
WIRELESS SECURITY
CONCERNS
1 Rogue AP
Connected to Network
(Network Breach)
Hacker
3 Leaked Wired
Traffic & Insertion
(Data Leakage)
Hotspot Evil Twin
Mobile User2
Hotspot Phishing
(Data Leakage)
5 Users Bypassing Network
Security Controls
(Data Leakage/Network Backdoor)
4
Non-Compliant AP
(Network Breach/Data Leakage/
Data Compromise)
Muni Wi-Fi or Neighbors
The wireless networks are based on the IEEE
standards belonging to the 802 family.
 Following list is a simple overview of the 802.11
family:
• 802.11b
o Most widespread
o 11Mb maximum, 2.4 GHZ band
• 802.11a
o Next generation
o 54MB maximum, 5GHZ band
• 802.11g
o 54MB maximum, 2.4 GHZ band
o Compatible with 802.11b
• 802.11X
o Uses Extensible Authentication Protocol (EAP)
o Supports RADIUS
• 802.11i
OVERVIEW OF WIRELESS TECHNOLOGY.
NEED OF WIRELESS SECURITY
 Prevention of unauthorized access or damage to computers
using wireless networks.
 Guard against unauthorized access to important resources.
 Protection from attacks on:
 Confidentiality: The protection of data from
unauthorized disclosure.
 Integrity: The assurance that data received are exactly
as sent by an authorized entity.
 Availability: Authorized users have reliable and timely
access to information.
7
Wireless Equivalent Privacy (WEP)
 WEP algorithm is used to protect wireless
communication from eavesdropping and to
prevent unauthorized access to a wireless
network.
 The original implementations of WEP supported
so-called 40-bit encryption, having a key of
length 40 bits and 24 additional bits of system-
generated data (64 bits total).
 40-bit WEP encryption is too easy to decode.
 128-bit encryption (key length of 104 bits, not
128 bits).
 WEP relies on a secret key.
 WEP uses the RC4 encryption algorithm, which is
known as a stream cipher.
 stream cipher operates by expanding a short key
into an infinite pseudo-random key stream.
Wireless Equivalent Privacy (WEP)
(Cont.)
WPA (Wi-Fi Protected Access)
 It is also known as WEP+.
 WEP+ enhances WEP security by avoiding "weak
IVs“.
 It is only completely effective when WEP+ is used
at both ends of the wireless connection.
 WPA use Temporal Key Integrity Protocol (TKIP) to
addresses the encryption weaknesses of WEP.
 Key component of WPA is built-in authentication
that WEP does not offer.
WPA (Wi-Fi Protected Access) (Cont.)
 One variation of WPA is called WPA Pre Shared
Key or WPA-PSK.
 By using TKIP, WPA-PSK automatically changes
the keys at a preset time interval, making it
much more difficult for hackers to find and
exploit them.
 WPA uses the RC4 cipher.
 Keys are rotated frequently, and the packet
counter prevents packet replay or packet re-
injection attacks.
WPA2 (Wi-Fi Protected Access)
 WPA2 (Wi-Fi Protected Access 2) gives wireless
networks both confidentiality and data
integrity.
 The Layer 2-based WPA2 better protects the
network.
 WPA2 uses a new encryption method called
CCMP (Counter-Mode with CBC-MAC Protocol).
 CCMP is based on Advanced Encryption
Standard (AES).
 AES is stronger algorithm then RC4.
Wireless Network Threats
 Traffic Analysis.
 Passive Eavesdropping.
 Active Eavesdropping.
 Unauthorized Access.
 Man-in-the-middle
 Session High-Jacking
 Denial of service (DoS)
Traffic Analysis
 Traffic analysis allows the attacker to
obtain three forms of information.
 The attacker preliminary identify that
there is activity on the network.
 The identification and Physical location of
the Wireless Access Point (AP).
 The type of protocol being used during the
transmission.
Passive Eavesdropping
Attacker
Target
 Passive Eavesdropping allows the attacker to obtain two
forms of information.
 The attacker can read the data transmitted in the session.
 The attacker can read the information i.e. source,
destination, size, number and time of transmission.
Active Eavesdropping
 Active Eavesdropping allows the attacker inject the data
into the communication to decipher the payload.
 Active Eavesdropping can take into two forms.
 The attacker can modify the packet.
 The attacker can inject complete packet into the
data.
 The WEP by using CRC only check the integrity of the
data into the packet.
Unauthorized Access
 Due to physical properties of the WLAN, the
attacker will always have access to the
Wireless components of the network.
 If attacker become successful to get
unauthorized access to the network by using
brute force attack, man in the middle and
denial of service attack, attacker can enjoy
the whole network services.
Man-in-the-Middle
Session Hi-Jacking
 Changing Administrator Passwords and Usernames
 Upgrading your Wi-fi Encryption
 Changing the Default System ID
 MAC Address Filtering
 Stop Publicly Broadcasting your Network
 Auto-Connect to Open Wi-fi Networks?
 You've got a built-in firewall, so use it
 Positioning of the Router or Access Point
 When to Turn Off the Network
Wireless security

More Related Content

PPT
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
PPT
Wireless Device and Network level security
PPTX
Wireless security
PPT
Wireless security presentation
PPTX
Wireless Attacks
PPTX
Wireless Network Security
ODP
Wifi Security, or Descending into Depression and Drink
PPT
Securing wireless network
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Wireless Device and Network level security
Wireless security
Wireless security presentation
Wireless Attacks
Wireless Network Security
Wifi Security, or Descending into Depression and Drink
Securing wireless network

What's hot (20)

PPTX
Wireless network security
PDF
Wi-Fi security – WEP, WPA and WPA2
PPTX
Wireless network security
PPTX
Wireless Network security
PDF
Cit877[1]
PPTX
Wi fi security
PPT
WEP
PPTX
Wi Fi Security
PPT
Wlan security
PPTX
802.11 Wireless, WEP, WPA lecture
PPTX
Wpa vs Wpa2
PPTX
WEP/WPA attacks
PPTX
Wired equivalent privacy (wep)
PDF
8 Authentication Security Protocols
PPTX
Wired equivalent privacy by SecArmour
PPTX
Wireless Network Security
PPT
Cracking wep and wpa wireless networks
PPT
Security attacks
PPT
Lecture 5 ip security
PPT
Shashank wireless lans security
Wireless network security
Wi-Fi security – WEP, WPA and WPA2
Wireless network security
Wireless Network security
Cit877[1]
Wi fi security
WEP
Wi Fi Security
Wlan security
802.11 Wireless, WEP, WPA lecture
Wpa vs Wpa2
WEP/WPA attacks
Wired equivalent privacy (wep)
8 Authentication Security Protocols
Wired equivalent privacy by SecArmour
Wireless Network Security
Cracking wep and wpa wireless networks
Security attacks
Lecture 5 ip security
Shashank wireless lans security
Ad

Similar to Wireless security (20)

PPT
chapter 8.ppt
PPT
4 wifi security
PPT
chapter 7 -wireless network security.ppt
PPTX
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
PPTX
Wpa2 psk security measure
PPTX
Module 6 Wireless Network security
PPTX
lm_wireless_security_overview_of_wireless_sec.pptx
PPTX
Wifi Security
PDF
ECE560 Wireless and Mobile Security Fall2020..pdf
PDF
Analysis Of Security In Wireless Network
PDF
Comprehensive Guide On Network Security
PPT
Wireless hacking septafiansyah
PPT
Wireless security837
PPTX
Chương 2_2_Final (1).pptxfffffffffffffffffffffff
PDF
Talk2 esc2 muscl-wifi_v1_2b
PPT
5169 wireless network_security_amine_k
PPTX
WIRELESS_SECURITY.pptx
PPTX
Security standard
PDF
Viable means using which Wireless Network Security can be Jeopardized
PPTX
TOPIC 4 WIRELESS TECHNOLOGIES AND BASIC SECURITY (1).pptx
chapter 8.ppt
4 wifi security
chapter 7 -wireless network security.ppt
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
Wpa2 psk security measure
Module 6 Wireless Network security
lm_wireless_security_overview_of_wireless_sec.pptx
Wifi Security
ECE560 Wireless and Mobile Security Fall2020..pdf
Analysis Of Security In Wireless Network
Comprehensive Guide On Network Security
Wireless hacking septafiansyah
Wireless security837
Chương 2_2_Final (1).pptxfffffffffffffffffffffff
Talk2 esc2 muscl-wifi_v1_2b
5169 wireless network_security_amine_k
WIRELESS_SECURITY.pptx
Security standard
Viable means using which Wireless Network Security can be Jeopardized
TOPIC 4 WIRELESS TECHNOLOGIES AND BASIC SECURITY (1).pptx
Ad

Recently uploaded (20)

PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
additive manufacturing of ss316l using mig welding
PDF
Well-logging-methods_new................
PPTX
Sustainable Sites - Green Building Construction
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT
Mechanical Engineering MATERIALS Selection
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
DOCX
573137875-Attendance-Management-System-original
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Embodied AI: Ushering in the Next Era of Intelligent Systems
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Lecture Notes Electrical Wiring System Components
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
additive manufacturing of ss316l using mig welding
Well-logging-methods_new................
Sustainable Sites - Green Building Construction
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mechanical Engineering MATERIALS Selection
Arduino robotics embedded978-1-4302-3184-4.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
573137875-Attendance-Management-System-original
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Strings in CPP - Strings in C++ are sequences of characters used to store and...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

Wireless security

  • 3. Presented by: Vinay. V. Chitrakathi T.E. (C.S.E.) Wireless Security: Risks and Solutions Presented to: Prof. A. D. Pathak Seminar Guide
  • 4.  Overview of Wireless Technology.  Security and Privacy issues in Wireless Network.  Wireless Security Protocols.  Wireless Equivalent Privacy (WEP).  Wireless Equivalent Privacy (WEP2).  Wi-Fi Protected Access (WPA).  Temporal Key Integrity Protocol (TKIP).  WPA Pre Shared Key (WPA-PSK).  Wi-Fi Protected Access (WPA2).  Counter-Mode with CBC-MAC Protocol (CCMP).  Wireless Network Threats.  Traffic Analysis.  Passive Eavesdropping.  Active Eavesdropping.  Unauthorized Access.  Man-in-the-middle  Session High-Jacking  Replay  Denial of service (DoS) Contents
  • 5. MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. © Motorola, Inc. 2010. All rights reserved. 5 INTERNET Server Network Edge Blurred New Attack Vectors ‘Behind’ the Firewall WIRELESS SECURITY CONCERNS 1 Rogue AP Connected to Network (Network Breach) Hacker 3 Leaked Wired Traffic & Insertion (Data Leakage) Hotspot Evil Twin Mobile User2 Hotspot Phishing (Data Leakage) 5 Users Bypassing Network Security Controls (Data Leakage/Network Backdoor) 4 Non-Compliant AP (Network Breach/Data Leakage/ Data Compromise) Muni Wi-Fi or Neighbors
  • 6. The wireless networks are based on the IEEE standards belonging to the 802 family.  Following list is a simple overview of the 802.11 family: • 802.11b o Most widespread o 11Mb maximum, 2.4 GHZ band • 802.11a o Next generation o 54MB maximum, 5GHZ band • 802.11g o 54MB maximum, 2.4 GHZ band o Compatible with 802.11b • 802.11X o Uses Extensible Authentication Protocol (EAP) o Supports RADIUS • 802.11i OVERVIEW OF WIRELESS TECHNOLOGY.
  • 7. NEED OF WIRELESS SECURITY  Prevention of unauthorized access or damage to computers using wireless networks.  Guard against unauthorized access to important resources.  Protection from attacks on:  Confidentiality: The protection of data from unauthorized disclosure.  Integrity: The assurance that data received are exactly as sent by an authorized entity.  Availability: Authorized users have reliable and timely access to information. 7
  • 8. Wireless Equivalent Privacy (WEP)  WEP algorithm is used to protect wireless communication from eavesdropping and to prevent unauthorized access to a wireless network.  The original implementations of WEP supported so-called 40-bit encryption, having a key of length 40 bits and 24 additional bits of system- generated data (64 bits total).  40-bit WEP encryption is too easy to decode.
  • 9.  128-bit encryption (key length of 104 bits, not 128 bits).  WEP relies on a secret key.  WEP uses the RC4 encryption algorithm, which is known as a stream cipher.  stream cipher operates by expanding a short key into an infinite pseudo-random key stream. Wireless Equivalent Privacy (WEP) (Cont.)
  • 10. WPA (Wi-Fi Protected Access)  It is also known as WEP+.  WEP+ enhances WEP security by avoiding "weak IVs“.  It is only completely effective when WEP+ is used at both ends of the wireless connection.  WPA use Temporal Key Integrity Protocol (TKIP) to addresses the encryption weaknesses of WEP.  Key component of WPA is built-in authentication that WEP does not offer.
  • 11. WPA (Wi-Fi Protected Access) (Cont.)  One variation of WPA is called WPA Pre Shared Key or WPA-PSK.  By using TKIP, WPA-PSK automatically changes the keys at a preset time interval, making it much more difficult for hackers to find and exploit them.  WPA uses the RC4 cipher.  Keys are rotated frequently, and the packet counter prevents packet replay or packet re- injection attacks.
  • 12. WPA2 (Wi-Fi Protected Access)  WPA2 (Wi-Fi Protected Access 2) gives wireless networks both confidentiality and data integrity.  The Layer 2-based WPA2 better protects the network.  WPA2 uses a new encryption method called CCMP (Counter-Mode with CBC-MAC Protocol).  CCMP is based on Advanced Encryption Standard (AES).  AES is stronger algorithm then RC4.
  • 13. Wireless Network Threats  Traffic Analysis.  Passive Eavesdropping.  Active Eavesdropping.  Unauthorized Access.  Man-in-the-middle  Session High-Jacking  Denial of service (DoS)
  • 14. Traffic Analysis  Traffic analysis allows the attacker to obtain three forms of information.  The attacker preliminary identify that there is activity on the network.  The identification and Physical location of the Wireless Access Point (AP).  The type of protocol being used during the transmission.
  • 15. Passive Eavesdropping Attacker Target  Passive Eavesdropping allows the attacker to obtain two forms of information.  The attacker can read the data transmitted in the session.  The attacker can read the information i.e. source, destination, size, number and time of transmission.
  • 16. Active Eavesdropping  Active Eavesdropping allows the attacker inject the data into the communication to decipher the payload.  Active Eavesdropping can take into two forms.  The attacker can modify the packet.  The attacker can inject complete packet into the data.  The WEP by using CRC only check the integrity of the data into the packet.
  • 17. Unauthorized Access  Due to physical properties of the WLAN, the attacker will always have access to the Wireless components of the network.  If attacker become successful to get unauthorized access to the network by using brute force attack, man in the middle and denial of service attack, attacker can enjoy the whole network services.
  • 20.  Changing Administrator Passwords and Usernames  Upgrading your Wi-fi Encryption  Changing the Default System ID  MAC Address Filtering  Stop Publicly Broadcasting your Network  Auto-Connect to Open Wi-fi Networks?  You've got a built-in firewall, so use it  Positioning of the Router or Access Point  When to Turn Off the Network