A Wireless LAN Security Protocol
description
Transcript of A Wireless LAN Security Protocol
![Page 1: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/1.jpg)
A Wireless LAN Security Protocol
CTP/CURTIN/2011/GROUP 29
![Page 2: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/2.jpg)
Group Members
DCN09C4-0808 D.M.N.Dissanayake
![Page 3: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/3.jpg)
Why WLAN Security?Intruders who try to attack the computers
Rogue APSoft APMAC spoofingDenial of Service
The communication between server and client of a WLAN can be hacked by an intruder.
![Page 4: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/4.jpg)
Security RequirmentsConfidentiality-Messages sent must be encrypted
Authentication-Origin of message received must be verified
Integrity-Integrity of messages received must be verified
Access Control-Access for legitimate entities only
![Page 5: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/5.jpg)
Available Protocols
WPE (Wired Equivalent Privacy)WPA (Wi-Fi Protected Access)WPA2TKIP (Temporal Key Integrity Protocol)
![Page 6: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/6.jpg)
New ProtocolClient generate a session key.
User Inputs a key
Hashes are generated for both the keys.
The user-input key is encrypted with the time key and the time key is encrypted with a hard-coded key.
![Page 7: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/7.jpg)
New Protocol cont…Client sends the hashes and encrypted passwords to server through an access point
Server decrypts keys
Server generates hashes for the decrypted keys and compares them with the hashes
If all is good, further communication is done using same user key.
![Page 8: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/8.jpg)
New Protocol cont…If there is a failure, the session is terminated.
The client sends “exit” command, and the session is terminated.
![Page 9: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/9.jpg)
Block Diagram
![Page 10: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/10.jpg)
Time Plan
![Page 11: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/11.jpg)
Advantages of this protocol…User may be able use a very interact with other computers more securely.
![Page 12: A Wireless LAN Security Protocol](https://reader036.fdocuments.us/reader036/viewer/2022082712/56813a07550346895da1d413/html5/thumbnails/12.jpg)
Thank You