a wireless lan security protocol
DESCRIPTION
A Wireless LAN Security Protocol. CTP/CURTIN/2011/GROUP 29. Group Members. DCN09C4-0808 D.M.N.Dissanayake. Why WLAN Security?. Intruders who try to attack the computers Rogue AP Soft AP MAC spoofing Denial of Service - PowerPoint PPT PresentationTRANSCRIPT
A Wireless LAN Security Protocol
CTP/CURTIN/2011/GROUP 29
Group Members
DCN09C4-0808 D.M.N.Dissanayake
Why WLAN Security?Intruders who try to attack the computers
Rogue APSoft APMAC spoofingDenial of Service
The communication between server and client of a WLAN can be hacked by an intruder.
Security RequirmentsConfidentiality-Messages sent must be encrypted
Authentication-Origin of message received must be verified
Integrity-Integrity of messages received must be verified
Access Control-Access for legitimate entities only
Available Protocols
WPE (Wired Equivalent Privacy)WPA (Wi-Fi Protected Access)WPA2TKIP (Temporal Key Integrity Protocol)
New ProtocolClient generate a session key.
User Inputs a key
Hashes are generated for both the keys.
The user-input key is encrypted with the time key and the time key is encrypted with a hard-coded key.
New Protocol cont…Client sends the hashes and encrypted passwords to server through an access point
Server decrypts keys
Server generates hashes for the decrypted keys and compares them with the hashes
If all is good, further communication is done using same user key.
New Protocol cont…If there is a failure, the session is terminated.
The client sends “exit” command, and the session is terminated.
Block Diagram
Time Plan
Advantages of this protocol…User may be able use a very interact with other computers more securely.
Thank You