a wireless lan security protocol

12
A Wireless LAN Security Protocol CTP/CURTIN/2011/GROUP 29

Upload: fedora

Post on 05-Jan-2016

35 views

Category:

Documents


2 download

DESCRIPTION

A Wireless LAN Security Protocol. CTP/CURTIN/2011/GROUP 29. Group Members. DCN09C4-0808 D.M.N.Dissanayake. Why WLAN Security?. Intruders who try to attack the computers Rogue AP Soft AP MAC spoofing Denial of Service - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A Wireless LAN Security Protocol

A Wireless LAN Security Protocol

CTP/CURTIN/2011/GROUP 29

Page 2: A Wireless LAN Security Protocol

Group Members

DCN09C4-0808 D.M.N.Dissanayake

Page 3: A Wireless LAN Security Protocol

Why WLAN Security?Intruders who try to attack the computers

Rogue APSoft APMAC spoofingDenial of Service

The communication between server and client of a WLAN can be hacked by an intruder.

Page 4: A Wireless LAN Security Protocol

Security RequirmentsConfidentiality-Messages sent must be encrypted

Authentication-Origin of message received must be verified

Integrity-Integrity of messages received must be verified

Access Control-Access for legitimate entities only

Page 5: A Wireless LAN Security Protocol

Available Protocols

WPE (Wired Equivalent Privacy)WPA (Wi-Fi Protected Access)WPA2TKIP (Temporal Key Integrity Protocol)

Page 6: A Wireless LAN Security Protocol

New ProtocolClient generate a session key.

User Inputs a key

Hashes are generated for both the keys.

The user-input key is encrypted with the time key and the time key is encrypted with a hard-coded key.

Page 7: A Wireless LAN Security Protocol

New Protocol cont…Client sends the hashes and encrypted passwords to server through an access point

Server decrypts keys

Server generates hashes for the decrypted keys and compares them with the hashes

If all is good, further communication is done using same user key.

Page 8: A Wireless LAN Security Protocol

New Protocol cont…If there is a failure, the session is terminated.

The client sends “exit” command, and the session is terminated.

Page 9: A Wireless LAN Security Protocol

Block Diagram

Page 10: A Wireless LAN Security Protocol

Time Plan

Page 11: A Wireless LAN Security Protocol

Advantages of this protocol…User may be able use a very interact with other computers more securely.

Page 12: A Wireless LAN Security Protocol

Thank You