Upload
sanjay-mate
View
57
Download
2
Embed Size (px)
Citation preview
Designed By : Shashank S. Diwan, Sanjay R. Mate.
College : M M C O E, Pune.
Definition : Network is connection between two or more equipments, used for sharing data , resources or communication.
Types Of Wireless Network
•Wireless LAN•Wireless MAN•Wi-Fi•Satellite Networking•Radio Networking
Efficiency Of Wireless NetworkBurlington Northern & Santa Railway
company(BNSR) in US railroad uses Wi-Fi to run ‘driverless’ train
The Navy was reportedly interested in deploying 802.11b technology to control Warships
Numerous applications based on Satellite communication
…..
Wireless Standards 802.11A Bandwidth up to 54 Mbps. Limited range Difficulty penetrating walls.
802.11B Bandwidth up to 11 Mbps. It has a much better range than 802.11a Not as easily obstructed by walls or other objects. Suffer from more interference from other electronic device such as microwaves.. 802.11G Bandwidth up to 54 Mbps Range that will cover most average homes. These devices are still typically common in retail stores but are quickly being Replaced by the newer technologies such as 802.11N. 802.11.N Bandwidth 600 Mbps Cover an extremely large home or small business.
Problems/AttacksDoS Attacks & DDoS AttacksThreat Integrity AttackAuthentication And Accountability AttackChannel Jamming Session HijackingConfidentiality Attack
SYN Attack
Attackers
Server
Valid User
Server Busy Attackers took all TCP connections
SYN Flood requests with spoofed IP
Replies Lost (spoofed IP recipient)
(B)
(C)
(A)
Public Network( internet )
156.12.25.4 132.12.25.1
DATA
IP Source ID DestinationHacker
(168.12.25.5)
DoS Attack
Company
WEB SERVER
Valid User(156.12.25.4)
(132.12.25.1)
IP Spoofing
IP Spoofing: When attacker outside your network pretend to be trusted user by using IP address within range of trusted IP address or by using external IP address that you trust. Attacker can masquerade as the remote authorized user to connect your network.
To Overcome Network Attack/problem
There are three technique available for the authentication1.Open system Authentication2.Shared key3.EAP/82.1x
The network can be secure with help of:1.Physical layer network2.802.1x standard3.VPN
CA
Certificates database
Certificate file libraries
Data Base
USB Key
SSL
SSL
SSL
Identification Authentication Overview
PKCS#12
source: nwfusion.com
802.1x Standard
Rules for WLAN Security
• Activate Physical Layer Security. While WEP has its weaknesses, TKIP, specified as part of WPA, provides a base level of security. When combined with 802.1X (see rule 3) it provides a very strong level of security.
• Don’t Broadcast or Use Default SSIDs. By changing the default SSID and configuring the access point not to broadcast the SSID, the most common sniffing tools can be rendered useless.
• Use 802.1X User Authentication. When access points are configured to support 802.1X, users are not allowed on the network without proper credentials (user name/password or certificates). Once authenticated, the client and access point are provided with unique, random session keys to encrypt the data transfers.
•Implement Personal Firewalls. Even if a hacker is able to associate with an access point, the personalfirewall will prevent them from accessing files on a user device on the same WLAN..
Applications of Wireless Network
•Clinical information security policies
•Communication Inter Vehicle Intelligent Cooperative
•Networking using BLUETOOTH technology
•Wireless Mesh Networking for emergency application
•Wireless ATM networks
Conclusion
The benefit of wireless networks is driving the explosive growth of the WLAN market. Where security has been the single largest concern for wireless network deployment in the corporate setting, strong security solutions are available to make wireless networks as secure as wired networks.
Wi-Fi Protected Access (WPA) overcomes the inherent flaws of early wireless networks. WPA uses TKIP at the physical layer, and 802.1X security for user authentication create the basis for strong wireless network security. WPA is capable of preventing most sophisticated attacks on wireless networks, and there are no known tools available to crack this level of wireless security.
This approach offers a pragmatic solution to wireless security and can resolve the single largest barrier to WLAN deployment for IT managers. A cost-effective solution using 802.1X security can be deployed to deny access to any user without the proper credentials, and provide strong security for wireless networks.