220 likes | 389 Views
WIRELESS LAN AND SECURITY. PREPARED BY: DHARMRAJ V. CHUDASAMA 6 TH INFORMATION TECHNOLOGY ROLL NO 7. INTRODUCTION. WIRELESS TECHNOLOGY IS STRECHING ITS LEGS DAY BY DAY MOBILE DEVICES HAVE GONE BEYOND COUNTLESS LIMITS MANY USERS DON’T KNOW WHAT IS THERE IN THEIR MAGICAL KIT.
E N D
WIRELESS LAN AND SECURITY PREPARED BY: DHARMRAJ V. CHUDASAMA 6TH INFORMATION TECHNOLOGY ROLL NO 7
INTRODUCTION • WIRELESS TECHNOLOGY IS STRECHING ITS LEGS DAY BY DAY • MOBILE DEVICES HAVE GONE BEYOND COUNTLESS LIMITS • MANY USERS DON’T KNOW WHAT IS THERE IN THEIR MAGICAL KIT
Anatomy of a radio LAN • The radio modem • The MAC controller • The host interface • The driver • Wireless LAN or not • Professional and Home Wireless LANs
The radio modem • ISM frequency bands at 900 MHz & 2.4 GHz • HiperLAN and UNII band • Spread Spectrum Technology • Diversity • Directional Antennas • Range Issues
The MAC Level • Main channel access mechanisms TDMA CSMA/CA Polling MAC • MAC Techniques MAC Retransmission Fragmentation RTS/CTS • Network Topology Ad-hoc Access point and Roaming Radio MAC Forwarding
Security • Authentication and Identification Requirements in Wireless Tech • Assumptions in Password Authentication Assurance of Authentication Secured Communication channel Limit number of wrong guesses Easy remembrance
The problem with WLAN • The user has no way to knowing where the access point is? • The radio network that can be monitored by anyone with a radio receiver. • The attacker can make password guesses on separate computer.
Requirements for Wireless Authentication • Requirements (Must Have) • Additional Characteristics (Should Have) • Other Useful Features
Requirements (Must Have) • Mutual • Self-protecting • Immure to dictionary attacks • Produces session key
Additional Characteristics • Authenticates User • Forward Secrecy • Access Points • Quick and Efficient • Low Maintenance Cost • Convenient for Users
Other Useful Features • Augments Legacy Methods • Fast Re-authentication
Certificate base methods • EAP-TLS • EAP-TTLS • PEAP
Problems with CBM • Cost of administration • Lengthy protocol exchange • Authenticates the device instead of the user/require a smart card
Password authentication methods • LEAP • Strong password authentication • The power of the SPEKE
KNOWING RISKS • Insertion attacks • Interception • Jamming • Client to client attack • Encryption attack
Conclusion • Wireless Networks are inevitable in this growing market • They are the most successful means of communication • Cost savings, productivity, competitive market advantages • Question is not whether but when will be need wireless security?