Top Banner
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security in wireless la ns
Page 2: Security in wireless la ns

Aisha AzizAisha AzizCT -013CT -013

Page 3: Security in wireless la ns
Page 4: Security in wireless la ns

IntroductionIntroductionTo Wireless To Wireless LANsLANs

Page 5: Security in wireless la ns
Page 6: Security in wireless la ns
Page 7: Security in wireless la ns

Wired Wired Equivalent Equivalent Privacy (WEP)Privacy (WEP)

Page 8: Security in wireless la ns

•WEP came in existence in 1999.•It uses RC4 algorithm for confidentiality.

Page 9: Security in wireless la ns

WEP WEP Cracking Cracking ReasonsReasons

Page 10: Security in wireless la ns
Page 11: Security in wireless la ns

Wi-Fi ProtectedWi-Fi Protected Access (WPA)Access (WPA)

Page 12: Security in wireless la ns

Modes of WPA

Page 13: Security in wireless la ns
Page 14: Security in wireless la ns

Basic Key

Initialization Vector (IV)

Hash Special Key RC4

Plain Text XOR

IV

Sequential Key

Message Encrypted

Page 15: Security in wireless la ns

Solutions of WEP Problems

Page 16: Security in wireless la ns

WPA Issue & My Opinion

Page 17: Security in wireless la ns

ComparisonComparison

Page 18: Security in wireless la ns
Page 19: Security in wireless la ns

Energy Energy ConsumptionConsumption

Page 20: Security in wireless la ns

Energy Consumption

Page 21: Security in wireless la ns

Session Level security protocol.

Whenever a session is need to be established there are three main entities are used Mobile station (MS), Authentication Server (AS) and Access Point (AP).

All of three works in three phases. Discovery Phase, Authentication phase and Four-way Handshake phase.

Four-way hand shake is done for a possession of PMK Pre Master Key which in turns split into Pair wise Transient key (PTK).

Page 22: Security in wireless la ns
Page 23: Security in wireless la ns

Cryptographic Cryptographic Key ExchangeKey Exchange

Page 24: Security in wireless la ns
Page 25: Security in wireless la ns
Page 26: Security in wireless la ns