SlideShare a Scribd company logo
1 of 10
๏ƒ˜Wireless security is the prevention of
unauthorized access or damage to
computers using wireless networks.
๏ƒ˜Network supported by radio
communications
๏ƒ˜Wireless networks are exposed to
speciallized attacks
๏ƒ˜concerns for wireless security are similar
to those found in a wired environment
no inherent physical protection
๏ฝ โ€“ physical connections between devices are replaced by
logical associations
๏ฝ โ€“ sending and receiving messages do not need physical
access to the network
๏ฝ infrastructure (cables, hubs, routers, etc.)
broadcast communications
๏ฝ โ€“ wireless usually means radio, which has a broadcast
nature
๏ฝ โ€“ transmissions can be overheard by anyone in range
๏ฝ โ€“ anyone can generate transmissions,
๏ฝ โ€ข which will be received by other devices in range
๏ฝ โ€ข which will interfere with other nearby transmissions and
may prevent their
๏ฝ correct reception (jamming)
๏ฝ eavesdropping is easy
๏ฝ injecting bogus messages into the network is
easy
๏ฝ replaying previously recorded messages is
easy
๏ฝ illegitimate access to the network and its
services is easy
๏ฝ denial of service is easily achieved by
jamming
confidentiality
๏ฝ โ€“ messages sent over wireless links must be
encrypted
authenticity
๏ฝ โ€“ origin of messages received over wireless
links must be verified
replay detection
๏ฝ โ€“ freshness of messages received over
wireless links must be checked
integrity
๏ฝ โ€“ modifying messages on-the-fly (during radio
transmission) is not so easy,
๏ฝ but possible โ€ฆ
๏ฝ โ€“ integrity of messages received over wireless
links must be verified
access control
๏ฝ โ€“ access to the network services should be
provided only to legitimate
๏ฝ entities
๏ฝ โ€“ access control should be permanent
๏ฝ protection against jamming
๏ฝ part of the IEEE 802.11 specification
goal
๏ฝ โ€“ make the WiFi network at least as secure as a
wired LAN (that
๏ฝ has no particular protection mechanisms)
๏ฝ โ€“ WEP has never intended to achieve strong
security
๏ฝ โ€“ (at the end, it hasnโ€™t achieved even weak
security)
services
๏ฝ โ€“ access control to the network
๏ฝ โ€“ message confidentiality
๏ฝ โ€“ message integrity
๏ฝ WEP relies on a secret key which is shared
between the sender (mobile station) and the
receiver (access point).
๏ฝ Secret Key : packets are encrypted using the
secret key before they are transmitted.
๏ฝ Integrity Check : it is used to ensure that
packets are not modified in transit
โ—ฆ Wi-Fi Protected Access (WPA)
๏‚– set of security mechanisms that eliminates most
802.11 security issues
๏‚– Wi-Fi Protected Access (WPA) and Wi-Fi Protected
Access II (WPA2) are two security protocols and
security certification programs developed by the Wi-Fi
to secure wireless computer networks
๏‚– based on the current state of the 802.11i standard
๏ฝ Wired Equivalent Privacy (WEP) and WEP2
๏ฝ Media access control (MAC) addresses:
configuring access points to permit only
particular MAC addresses onto the network.
Easy to implement, but fairly easy to defeat.
๏ฝ VPNs: using a VPN to encrypt data on
wireless networks. VPNs require a lot of
management and client configuration.
๏ฝ User authentication
๏ฝ The Temporal Key Integrity Protocol (TKIP)
[IEEE 802.11i]
๏ฝ Change default names
๏ฝ Add passwords to all devices
๏ฝ Disable broadcasting on network hubs
๏ฝ Don't give the network a name that identifies your
company
๏ฝ Move wireless hubs away from windows
๏ฝ Use the built-in encryption
๏ฝ Disable the features you don't use
๏ฝ Put a firewall between the wireless network and
other company computers
๏ฝ Encrypt data
๏ฝ Regularly test wireless network security

More Related Content

Similar to WIRELESS_SECURITY.pptx

Security issues
Security issuesSecurity issues
Security issues
Isaaq Mohammed
ย 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
ย 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
JigsAshley
ย 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
Shashank Srivastava
ย 

Similar to WIRELESS_SECURITY.pptx (20)

Security issues
Security issuesSecurity issues
Security issues
ย 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
ย 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
ย 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
ย 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
ย 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
ย 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
ย 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ย 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
ย 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
ย 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
ย 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
ย 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
ย 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
ย 
Chapter 9 PowerPoint.pptx
Chapter 9 PowerPoint.pptxChapter 9 PowerPoint.pptx
Chapter 9 PowerPoint.pptx
ย 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
ย 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
ย 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
ย 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
ย 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
ย 

Recently uploaded

Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
dharasingh5698
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
amitlee9823
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
ย 

Recently uploaded (20)

chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
ย 
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor ๐Ÿ“ฑ {7001035870} VIP Escorts chittoor
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
ย 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
ย 
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ย 

WIRELESS_SECURITY.pptx

  • 1. ๏ƒ˜Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. ๏ƒ˜Network supported by radio communications ๏ƒ˜Wireless networks are exposed to speciallized attacks ๏ƒ˜concerns for wireless security are similar to those found in a wired environment
  • 2. no inherent physical protection ๏ฝ โ€“ physical connections between devices are replaced by logical associations ๏ฝ โ€“ sending and receiving messages do not need physical access to the network ๏ฝ infrastructure (cables, hubs, routers, etc.) broadcast communications ๏ฝ โ€“ wireless usually means radio, which has a broadcast nature ๏ฝ โ€“ transmissions can be overheard by anyone in range ๏ฝ โ€“ anyone can generate transmissions, ๏ฝ โ€ข which will be received by other devices in range ๏ฝ โ€ข which will interfere with other nearby transmissions and may prevent their ๏ฝ correct reception (jamming)
  • 3. ๏ฝ eavesdropping is easy ๏ฝ injecting bogus messages into the network is easy ๏ฝ replaying previously recorded messages is easy ๏ฝ illegitimate access to the network and its services is easy ๏ฝ denial of service is easily achieved by jamming
  • 4. confidentiality ๏ฝ โ€“ messages sent over wireless links must be encrypted authenticity ๏ฝ โ€“ origin of messages received over wireless links must be verified replay detection ๏ฝ โ€“ freshness of messages received over wireless links must be checked
  • 5. integrity ๏ฝ โ€“ modifying messages on-the-fly (during radio transmission) is not so easy, ๏ฝ but possible โ€ฆ ๏ฝ โ€“ integrity of messages received over wireless links must be verified access control ๏ฝ โ€“ access to the network services should be provided only to legitimate ๏ฝ entities ๏ฝ โ€“ access control should be permanent ๏ฝ protection against jamming
  • 6. ๏ฝ part of the IEEE 802.11 specification goal ๏ฝ โ€“ make the WiFi network at least as secure as a wired LAN (that ๏ฝ has no particular protection mechanisms) ๏ฝ โ€“ WEP has never intended to achieve strong security ๏ฝ โ€“ (at the end, it hasnโ€™t achieved even weak security) services ๏ฝ โ€“ access control to the network ๏ฝ โ€“ message confidentiality ๏ฝ โ€“ message integrity
  • 7. ๏ฝ WEP relies on a secret key which is shared between the sender (mobile station) and the receiver (access point). ๏ฝ Secret Key : packets are encrypted using the secret key before they are transmitted. ๏ฝ Integrity Check : it is used to ensure that packets are not modified in transit
  • 8. โ—ฆ Wi-Fi Protected Access (WPA) ๏‚– set of security mechanisms that eliminates most 802.11 security issues ๏‚– Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi to secure wireless computer networks ๏‚– based on the current state of the 802.11i standard
  • 9. ๏ฝ Wired Equivalent Privacy (WEP) and WEP2 ๏ฝ Media access control (MAC) addresses: configuring access points to permit only particular MAC addresses onto the network. Easy to implement, but fairly easy to defeat. ๏ฝ VPNs: using a VPN to encrypt data on wireless networks. VPNs require a lot of management and client configuration. ๏ฝ User authentication ๏ฝ The Temporal Key Integrity Protocol (TKIP) [IEEE 802.11i]
  • 10. ๏ฝ Change default names ๏ฝ Add passwords to all devices ๏ฝ Disable broadcasting on network hubs ๏ฝ Don't give the network a name that identifies your company ๏ฝ Move wireless hubs away from windows ๏ฝ Use the built-in encryption ๏ฝ Disable the features you don't use ๏ฝ Put a firewall between the wireless network and other company computers ๏ฝ Encrypt data ๏ฝ Regularly test wireless network security