Vous êtes sur la page 1sur 28

A presentation on

WIRELESS SECURITY
PRESENTATION BY: PARV SHARMA 3307409 CSE 4th Yr

WIRELESS

Wireless is the transfer of information over a distance without the use of electrical conductors or wires. The distances involved may be short (a few meters as in television remote control) or long (thousands or millionsof kilometers for radio communications).

HISTORY OF WIRELESS
The first wireless transmitters went on the air in the early century using radiotelegraphy Later, as modulation,made it possible to transmit voices and

music via wireless, the medium came to be called "radio." With the advent of television, fax, data communication, and the effective use of a larger portion of the spectrum, the term "wireless" has been resurrected.

WHY WIRELESS ESSENTIAL


Delivers real time information. Helps in quick and accurate decision making. Increases productivity.

Continuous supply of information whenever needed.


Reduces costs via more accurate and timely data capture. Incorporate professionalism in the working in the organization.

EXAMPLES OF WIRELESS EQUIPEMENT


Cellular phones and pagers Global Positioning System (GPS)

Cordless computer peripherals


Cordless telephone sets

Home-entertainment-system control boxes


Remote garage-door openers Two-way radios

Baby monitors

Satellite Television

Wireless LAN or local area networks

TYPES OF WIRELESS NETWORK


Wireless local area networks
Personal area networks Wide area networks/ Metropolitan Area

Network Mobile Device Networks

WIRELESS BROAD BAND ACCESS

Wi-Fi

Wi-MAX

SECURITY REQUIREMENT IN WIRELESS


Authenticity : A third party must be able to verify that the content of a message has not been changed in transit.
Nonrepudiation : The origin or the receipt of a specific message must be verifiable by a third party. Accountability : The actions of an entity must be

traceable uniquely to that entity

SECURITY METHOD IN WIRELESS FIELD

WEP (Wired Equivalent Privacy)


SSID(Service Set Identifier)

MAC(Media Access Control)

INTRODUCTION TO WIRELESS NETWORK


Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the Internet).

NETWORK TOPOLOGY

STAR TOPOLOGY RING TOPOLOGY MESH TOPOLOGY BUS TOPOLOGY TREE TOPOLOGY

WIRELESS SECURITY
Is the prevention of unauthorized access

or damage to computers using wireless networks. Wireless networks are very common, both for organizations and individuals.

TYPES OF UNAUTHORIZED ACCESS


ACCIDENTIAL ASSOCIATION
MALICIOUS ASSOCIATION ADHOC NETWORK

NON-TRADITIONAL NETWORK
IDENTITY THEFT MANIN-THE-MIDDLE ATTACKS DENIAL OF SERVICE NETWORK INJECTION CAFFE LATTE ATTACK

ATTACK METHODS
HUMAN ERROR
ROGUE ACCESS POINT WARCHALKING MAC ADDRESS SPOFING NOISY NEIGHBOURS

IMPROPER DESIGN

BASIC DEFENCE IN WIRELESS SECURITY

WEP(WIRELESS ENCRYPTION PROTOCOL) MAC ADDRESS BLOCKING DITCH THE DEFAULT BEACON INTERVALS CONTROLLING RESET DISABLE DHCP

INTRODUCTION TO 802.11 SECURITY


The IEEE 802.11 specification identified several services

to provide a secure operating environment. The security services are provided largely by the Wired Equivalent Privacy (WEP) protocol to protect link-level data during wireless transmission between clients and access points. WEP does not provide end-to-end security, but only for the wireless portion of the connection.

SECURITY FEATURE OF 802.11 AS STANDARD


A.AUTHENTICATION
B.CONFIDIENTIALITY C.INTEGRITY

UNDERSTAND 802.11 FAMILY


1.802.11
2.802.11A 3.802.11B

4.802.11G

FUTURE OF WIRELESS
1.ULTRA WIDE BAND
2.COGNITIVE RADIO 3.MILLIMETER WAVE RADIO TECHNOLOGY 4.MULTIMODE 5.4G

SOME SNAPS OF WIRELESS REVOLUTION

QUESTIONS

Vous aimerez peut-être aussi