SlideShare a Scribd company logo
1 of 10
Wireless security is the prevention of
unauthorized access or damage to
computers using wireless networks.
Network supported by radio
communications
Wireless networks are exposed to
speciallized attacks
concerns for wireless security are similar
to those found in a wired environment
no inherent physical protection
 – physical connections between devices are replaced by
logical associations
 – sending and receiving messages do not need physical
access to the network
 infrastructure (cables, hubs, routers, etc.)
broadcast communications
 – wireless usually means radio, which has a broadcast
nature
 – transmissions can be overheard by anyone in range
 – anyone can generate transmissions,
 • which will be received by other devices in range
 • which will interfere with other nearby transmissions and
may prevent their
 correct reception (jamming)
 eavesdropping is easy
 injecting bogus messages into the network is
easy
 replaying previously recorded messages is
easy
 illegitimate access to the network and its
services is easy
 denial of service is easily achieved by
jamming
confidentiality
 – messages sent over wireless links must be
encrypted
authenticity
 – origin of messages received over wireless
links must be verified
replay detection
 – freshness of messages received over
wireless links must be checked
integrity
 – modifying messages on-the-fly (during radio
transmission) is not so easy,
 but possible …
 – integrity of messages received over wireless
links must be verified
access control
 – access to the network services should be
provided only to legitimate
 entities
 – access control should be permanent
 protection against jamming
 part of the IEEE 802.11 specification
goal
 – make the WiFi network at least as secure as a
wired LAN (that
 has no particular protection mechanisms)
 – WEP has never intended to achieve strong
security
 – (at the end, it hasn’t achieved even weak
security)
services
 – access control to the network
 – message confidentiality
 – message integrity
 WEP relies on a secret key which is shared
between the sender (mobile station) and the
receiver (access point).
 Secret Key : packets are encrypted using the
secret key before they are transmitted.
 Integrity Check : it is used to ensure that
packets are not modified in transit
◦ Wi-Fi Protected Access (WPA)
 set of security mechanisms that eliminates most
802.11 security issues
 Wi-Fi Protected Access (WPA) and Wi-Fi Protected
Access II (WPA2) are two security protocols and
security certification programs developed by the Wi-Fi
to secure wireless computer networks
 based on the current state of the 802.11i standard
 Wired Equivalent Privacy (WEP) and WEP2
 Media access control (MAC) addresses:
configuring access points to permit only
particular MAC addresses onto the network.
Easy to implement, but fairly easy to defeat.
 VPNs: using a VPN to encrypt data on
wireless networks. VPNs require a lot of
management and client configuration.
 User authentication
 The Temporal Key Integrity Protocol (TKIP)
[IEEE 802.11i]
 Change default names
 Add passwords to all devices
 Disable broadcasting on network hubs
 Don't give the network a name that identifies your
company
 Move wireless hubs away from windows
 Use the built-in encryption
 Disable the features you don't use
 Put a firewall between the wireless network and
other company computers
 Encrypt data
 Regularly test wireless network security

More Related Content

Similar to WIRELESS_SECURITY.pptx

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
JigsAshley
 

Similar to WIRELESS_SECURITY.pptx (20)

Security issues
Security issuesSecurity issues
Security issues
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Chapter 9 PowerPoint.pptx
Chapter 9 PowerPoint.pptxChapter 9 PowerPoint.pptx
Chapter 9 PowerPoint.pptx
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 

Recently uploaded

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 

WIRELESS_SECURITY.pptx

  • 1. Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Network supported by radio communications Wireless networks are exposed to speciallized attacks concerns for wireless security are similar to those found in a wired environment
  • 2. no inherent physical protection  – physical connections between devices are replaced by logical associations  – sending and receiving messages do not need physical access to the network  infrastructure (cables, hubs, routers, etc.) broadcast communications  – wireless usually means radio, which has a broadcast nature  – transmissions can be overheard by anyone in range  – anyone can generate transmissions,  • which will be received by other devices in range  • which will interfere with other nearby transmissions and may prevent their  correct reception (jamming)
  • 3.  eavesdropping is easy  injecting bogus messages into the network is easy  replaying previously recorded messages is easy  illegitimate access to the network and its services is easy  denial of service is easily achieved by jamming
  • 4. confidentiality  – messages sent over wireless links must be encrypted authenticity  – origin of messages received over wireless links must be verified replay detection  – freshness of messages received over wireless links must be checked
  • 5. integrity  – modifying messages on-the-fly (during radio transmission) is not so easy,  but possible …  – integrity of messages received over wireless links must be verified access control  – access to the network services should be provided only to legitimate  entities  – access control should be permanent  protection against jamming
  • 6.  part of the IEEE 802.11 specification goal  – make the WiFi network at least as secure as a wired LAN (that  has no particular protection mechanisms)  – WEP has never intended to achieve strong security  – (at the end, it hasn’t achieved even weak security) services  – access control to the network  – message confidentiality  – message integrity
  • 7.  WEP relies on a secret key which is shared between the sender (mobile station) and the receiver (access point).  Secret Key : packets are encrypted using the secret key before they are transmitted.  Integrity Check : it is used to ensure that packets are not modified in transit
  • 8. ◦ Wi-Fi Protected Access (WPA)  set of security mechanisms that eliminates most 802.11 security issues  Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi to secure wireless computer networks  based on the current state of the 802.11i standard
  • 9.  Wired Equivalent Privacy (WEP) and WEP2  Media access control (MAC) addresses: configuring access points to permit only particular MAC addresses onto the network. Easy to implement, but fairly easy to defeat.  VPNs: using a VPN to encrypt data on wireless networks. VPNs require a lot of management and client configuration.  User authentication  The Temporal Key Integrity Protocol (TKIP) [IEEE 802.11i]
  • 10.  Change default names  Add passwords to all devices  Disable broadcasting on network hubs  Don't give the network a name that identifies your company  Move wireless hubs away from windows  Use the built-in encryption  Disable the features you don't use  Put a firewall between the wireless network and other company computers  Encrypt data  Regularly test wireless network security