security in wireless la ns
DESCRIPTION
TRANSCRIPT
![Page 1: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/1.jpg)
![Page 2: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/2.jpg)
Aisha AzizAisha AzizCT -013CT -013
![Page 3: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/3.jpg)
![Page 4: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/4.jpg)
IntroductionIntroductionTo Wireless To Wireless LANsLANs
![Page 5: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/5.jpg)
![Page 6: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/6.jpg)
![Page 7: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/7.jpg)
Wired Wired Equivalent Equivalent Privacy (WEP)Privacy (WEP)
![Page 8: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/8.jpg)
•WEP came in existence in 1999.•It uses RC4 algorithm for confidentiality.
![Page 9: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/9.jpg)
WEP WEP Cracking Cracking ReasonsReasons
![Page 10: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/10.jpg)
![Page 11: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/11.jpg)
Wi-Fi ProtectedWi-Fi Protected Access (WPA)Access (WPA)
![Page 12: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/12.jpg)
Modes of WPA
![Page 13: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/13.jpg)
![Page 14: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/14.jpg)
Basic Key
Initialization Vector (IV)
Hash Special Key RC4
Plain Text XOR
IV
Sequential Key
Message Encrypted
![Page 15: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/15.jpg)
Solutions of WEP Problems
![Page 16: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/16.jpg)
WPA Issue & My Opinion
![Page 17: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/17.jpg)
ComparisonComparison
![Page 18: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/18.jpg)
![Page 19: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/19.jpg)
Energy Energy ConsumptionConsumption
![Page 20: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/20.jpg)
Energy Consumption
![Page 21: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/21.jpg)
Session Level security protocol.
Whenever a session is need to be established there are three main entities are used Mobile station (MS), Authentication Server (AS) and Access Point (AP).
All of three works in three phases. Discovery Phase, Authentication phase and Four-way Handshake phase.
Four-way hand shake is done for a possession of PMK Pre Master Key which in turns split into Pair wise Transient key (PTK).
![Page 22: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/22.jpg)
![Page 23: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/23.jpg)
Cryptographic Cryptographic Key ExchangeKey Exchange
![Page 24: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/24.jpg)
![Page 25: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/25.jpg)
![Page 26: Security in wireless la ns](https://reader035.vdocument.in/reader035/viewer/2022062614/54771b89b4af9ff1248b4d49/html5/thumbnails/26.jpg)