0% found this document useful (0 votes)
105 views14 pages

Wireless Network Securities

This document discusses wireless networks and their security. It defines a network as a connection between two or more equipments used for sharing data, resources or communication. It then describes different types of wireless networks such as wireless LAN, wireless MAN, Wi-Fi, satellite networking and radio networking. It also discusses wireless standards like 802.11a, 802.11b, 802.11g and 802.11n and their characteristics. Finally, it talks about ways to secure wireless networks including using WPA, 802.1X authentication and personal firewalls.

Uploaded by

Sanjay Mate
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views14 pages

Wireless Network Securities

This document discusses wireless networks and their security. It defines a network as a connection between two or more equipments used for sharing data, resources or communication. It then describes different types of wireless networks such as wireless LAN, wireless MAN, Wi-Fi, satellite networking and radio networking. It also discusses wireless standards like 802.11a, 802.11b, 802.11g and 802.11n and their characteristics. Finally, it talks about ways to secure wireless networks including using WPA, 802.1X authentication and personal firewalls.

Uploaded by

Sanjay Mate
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 14

Designed By : Shashank S.

Diwan,
Sanjay R. Mate.
College : M M C O E, Pune.
Definition :
Network is connection between two or more equipments, used
for sharing data , resources or communication.

Types Of Wireless Network


•Wireless LAN
•Wireless MAN
•Wi-Fi
•Satellite Networking
•Radio Networking
Efficiency Of Wireless Network
Burlington Northern & Santa Railway
company(BNSR) in US railroad uses Wi-Fi to run
‘driverless’ train
The Navy was reportedly interested in deploying
802.11b technology to control Warships
 Numerous applications based on Satellite
communication
…..
Wireless Standards
 802.11A
Bandwidth up to 54 Mbps.
Limited range
Difficulty penetrating walls.

 802.11B
Bandwidth up to 11 Mbps.
It has a much better range than 802.11a
Not as easily obstructed by walls or other objects.
Suffer from more interference from other electronic device such as microwaves..
 802.11G
Bandwidth up to 54 Mbps
Range that will cover most average homes.
These devices are still typically common in retail stores but are quickly being
Replaced by the newer technologies such as 802.11N.
 802.11.N
Bandwidth 600 Mbps
Cover an extremely large home or small business.
Problems/Attacks
DoS Attacks & DDoS Attacks
Threat Integrity Attack
Authentication And Accountability Attack
Channel Jamming
 Session Hijacking
Confidentiality Attack
Replies Lost
SYN Attack
(spoofed IP
recipient)

(A)
SYN Flood requests with spoofed IP

(B)
Server

Server Busy
Attackers took all
(C) TCP connections
Attackers

Valid User
DoS Attack
Public Network
( internet )

Company

Valid User
W
(156.12.25.4)
E
B
S
156.12.25.4 132.12.25.1 DATA E
R
V
IP Source ID Destination
E
Hacker R
(168.12.25.5) (132.12.25.1)
IP
Spoofing
IP Spoofing:
When attacker outside your network pretend to be trusted user by
using IP address within range of trusted IP address or by using external IP address
that you trust. Attacker can masquerade as the remote authorized user to connect
your network.
To Overcome Network Attack/problem

There are three technique available for the authentication


1.Open system Authentication
2.Shared key
3.EAP/82.1x

The network can be secure with help of:


1.Physical layer network
2.802.1x standard
3.VPN
PKCS#12
CA

SSL

USB Key
SSL

SSL
Certificates database

Certificate file libraries

Data Base

Identification Authentication Overview


802.1x Standard

source: nwfusion.com
Rules for WLAN Security

• Activate Physical Layer Security. While WEP has its weaknesses, TKIP, specified as
part of WPA, provides a base level of security. When combined with 802.1X (see rule 3)
it provides a very strong level of security.

• Don’t Broadcast or Use Default SSIDs. By changing the default SSID and
configuring the access point not to broadcast the SSID, the most common sniffing tools
can be rendered useless.

• Use 802.1X User Authentication. When access points are configured to support
802.1X, users are not allowed on the network without proper credentials (user
name/password or certificates). Once authenticated, the client and access point are
provided with unique, random session keys to encrypt the data transfers.

•Implement Personal Firewalls. Even if a hacker is able to associate with an access


point, the personal
firewall will prevent them from accessing files on a user device on the same WLAN.
.
Applications of Wireless
Network

•Clinical information security policies

•Communication Inter Vehicle Intelligent Cooperative

•Networking using BLUETOOTH technology

•Wireless Mesh Networking for emergency application

•Wireless ATM networks


Conclusion
The benefit of wireless networks is driving the explosive growth of the WLAN
market. Where security has been the single largest concern for wireless network
deployment in the corporate setting, strong security solutions are available to
make wireless networks as secure as wired networks.

Wi-Fi Protected Access (WPA) overcomes the inherent flaws of early wireless
networks. WPA uses TKIP at the physical layer, and 802.1X security for user
authentication create the basis for strong wireless network security. WPA is
capable of preventing most sophisticated attacks on wireless networks, and there
are no known tools available to crack this level of wireless security.

This approach offers a pragmatic solution to wireless security and can resolve
the single largest barrier to WLAN deployment for IT managers. A cost-effective
solution using 802.1X security can be deployed to deny access to any user without
the proper credentials, and provide strong security for wireless networks.

You might also like