14
Designed By : Shashank S. Diwan, Sanjay R. Mate. College : M M C O E, Pune.

Wireless Network Securities

Embed Size (px)

Citation preview

Page 1: Wireless Network Securities

Designed By : Shashank S. Diwan, Sanjay R. Mate.

College : M M C O E, Pune.

Page 2: Wireless Network Securities

Definition : Network is connection between two or more equipments, used for sharing data , resources or communication.

Types Of Wireless Network

•Wireless LAN•Wireless MAN•Wi-Fi•Satellite Networking•Radio Networking

Page 3: Wireless Network Securities

Efficiency Of Wireless NetworkBurlington Northern & Santa Railway

company(BNSR) in US railroad uses Wi-Fi to run ‘driverless’ train

The Navy was reportedly interested in deploying 802.11b technology to control Warships

Numerous applications based on Satellite communication

…..

Page 4: Wireless Network Securities

Wireless Standards 802.11A Bandwidth up to 54 Mbps. Limited range Difficulty penetrating walls.

802.11B Bandwidth up to 11 Mbps. It has a much better range than 802.11a Not as easily obstructed by walls or other objects. Suffer from more interference from other electronic device such as microwaves.. 802.11G Bandwidth up to 54 Mbps Range that will cover most average homes. These devices are still typically common in retail stores but are quickly being Replaced by the newer technologies such as 802.11N. 802.11.N Bandwidth 600 Mbps Cover an extremely large home or small business.

Page 5: Wireless Network Securities

Problems/AttacksDoS Attacks & DDoS AttacksThreat Integrity AttackAuthentication And Accountability AttackChannel Jamming Session HijackingConfidentiality Attack

Page 6: Wireless Network Securities

SYN Attack

Attackers

Server

Valid User

Server Busy Attackers took all TCP connections

SYN Flood requests with spoofed IP

Replies Lost (spoofed IP recipient)

(B)

(C)

(A)

Page 7: Wireless Network Securities

Public Network( internet )

156.12.25.4 132.12.25.1

DATA

IP Source ID DestinationHacker

(168.12.25.5)

DoS Attack

Company

WEB SERVER

Valid User(156.12.25.4)

(132.12.25.1)

Page 8: Wireless Network Securities

IP Spoofing

IP Spoofing: When attacker outside your network pretend to be trusted user by using IP address within range of trusted IP address or by using external IP address that you trust. Attacker can masquerade as the remote authorized user to connect your network.

Page 9: Wireless Network Securities

To Overcome Network Attack/problem

There are three technique available for the authentication1.Open system Authentication2.Shared key3.EAP/82.1x

The network can be secure with help of:1.Physical layer network2.802.1x standard3.VPN

Page 10: Wireless Network Securities

CA

Certificates database

Certificate file libraries

Data Base

USB Key

SSL

SSL

SSL

Identification Authentication Overview

PKCS#12

Page 11: Wireless Network Securities

source: nwfusion.com

802.1x Standard

Page 12: Wireless Network Securities

Rules for WLAN Security

• Activate Physical Layer Security. While WEP has its weaknesses, TKIP, specified as part of WPA, provides a base level of security. When combined with 802.1X (see rule 3) it provides a very strong level of security.

• Don’t Broadcast or Use Default SSIDs. By changing the default SSID and configuring the access point not to broadcast the SSID, the most common sniffing tools can be rendered useless.

• Use 802.1X User Authentication. When access points are configured to support 802.1X, users are not allowed on the network without proper credentials (user name/password or certificates). Once authenticated, the client and access point are provided with unique, random session keys to encrypt the data transfers.

•Implement Personal Firewalls. Even if a hacker is able to associate with an access point, the personalfirewall will prevent them from accessing files on a user device on the same WLAN..

Page 13: Wireless Network Securities

Applications of Wireless Network

•Clinical information security policies

•Communication Inter Vehicle Intelligent Cooperative

•Networking using BLUETOOTH technology

•Wireless Mesh Networking for emergency application

•Wireless ATM networks

Page 14: Wireless Network Securities

Conclusion

The benefit of wireless networks is driving the explosive growth of the WLAN market. Where security has been the single largest concern for wireless network deployment in the corporate setting, strong security solutions are available to make wireless networks as secure as wired networks.

Wi-Fi Protected Access (WPA) overcomes the inherent flaws of early wireless networks. WPA uses TKIP at the physical layer, and 802.1X security for user authentication create the basis for strong wireless network security. WPA is capable of preventing most sophisticated attacks on wireless networks, and there are no known tools available to crack this level of wireless security.

This approach offers a pragmatic solution to wireless security and can resolve the single largest barrier to WLAN deployment for IT managers. A cost-effective solution using 802.1X security can be deployed to deny access to any user without the proper credentials, and provide strong security for wireless networks.