Security in wireless la ns

Post on 27-Nov-2014

163 views 3 download

Tags:

description

 

Transcript of Security in wireless la ns

Aisha AzizAisha AzizCT -013CT -013

IntroductionIntroductionTo Wireless To Wireless LANsLANs

Wired Wired Equivalent Equivalent Privacy (WEP)Privacy (WEP)

•WEP came in existence in 1999.•It uses RC4 algorithm for confidentiality.

WEP WEP Cracking Cracking ReasonsReasons

Wi-Fi ProtectedWi-Fi Protected Access (WPA)Access (WPA)

Modes of WPA

Basic Key

Initialization Vector (IV)

Hash Special Key RC4

Plain Text XOR

IV

Sequential Key

Message Encrypted

Solutions of WEP Problems

WPA Issue & My Opinion

ComparisonComparison

Energy Energy ConsumptionConsumption

Energy Consumption

Session Level security protocol.

Whenever a session is need to be established there are three main entities are used Mobile station (MS), Authentication Server (AS) and Access Point (AP).

All of three works in three phases. Discovery Phase, Authentication phase and Four-way Handshake phase.

Four-way hand shake is done for a possession of PMK Pre Master Key which in turns split into Pair wise Transient key (PTK).

Cryptographic Cryptographic Key ExchangeKey Exchange