2
Most read
3
Most read
23
Most read
Wireless LAN Security
Kasturi Chakraborty
Shreosi Maitra
Suvadip Banerjee
Upasona Roy
Presented by
CONTENTS
 Introduction
 Wireless LAN Technology Options
 Types of Wireless LANs
 Basic Configuration
 Standards
 Advantages and Disadvantages
 Security issues and Solutions
Introduction
 Wireless LAN is a flexible communication system
implemented as an extension to a wired LAN, using
electromagnetic waves to transmit and receive data over
air, minimizing the need for wired connections.
 It is a communication network that provides connectivity to
wireless devices within a limited geographic area such as
home, school, single office, building or campus.
 "Wi-Fi" is the universal standard for wireless networks and is the
wireless equivalent of wired Ethernet networks.
Wireless LAN Technology Options
o Narrowband Technology
o Spread Spectrum Technology
o Frequency-Hopping Spread Spectrum Technology
o Direct Sequence Spread Spectrum Technology
o Infrared Technology
Basic Configuration
Types of Wireless LANs
Standards
1) IEEE 802.11
2) IEEE 802.11b
3) IEEE 802.11a
4) IEEE 802.11g
5) IEEE 802.11n
6) IEEE 802.11ac
Advantages
Key drivers are mobility and
accessibility.
Increased Productivity.
Improved collaboration.
No need to reconnect to the network.
Flexible installation and scalability.
Disadvantages
Very expensive.
Signal bleed over.
Environmental conditions.
Less capacity.
Is it Secure?
 Someone can block the entire radio communication
channel by transmitting junk on certain frequencies and
anonymously stage a denial of service attack from your
network.
 Anybody can plant viruses on our system.
 The webpages can be changed.
 As the number of WLAN cards grows so will the
opportunities for hackers to break into the wireless
networks.
 Regardless of the technology used , WLAN security will
always be limited because users will sidestep security
features.
Security Issues & Solutions
 War Driving
 Eavesdropping
 Denial of Service Attack
 Rogue Access Points
War Driving(Access Point
Mapping)
 It is the act of locating and possibly exploiting connections to
wireless local area networks while driving around a city or
elsewhere using a portable computer, smartphone or personal
digital assistant (PDA).
 Wireless NIC scans for wireless access points . The computer looks
for SSID (wireless network name) which is being constantly
transmitted by the access point , letting the computers know of its
presence.
 The wiredriver uses software like NetStumbler (Windows) or
Kismet (Linux) to scan the airwaves for SSIDS.
 The wiredriver generally configures his/her software to log any
strong unencrypted signal using GPS receiver and connect to the
access point.
Basic Configuration of War Driving
Solution for War Driving
o Do not broadcast your SSID.
o Change the default password.
o Encrypt your wireless connection using the encryption
schemes.
o Filter the MAC addresses that are allowed to connect to
your router.
o If you configure file sharing on your computer, make sure
it is password protected.
o Use personal firewall software.
Eavesdropping
 In wireless sensor networks ,any wireless network residing in the transmission
range of the transmitter can potentially decode the signal when both the
transmitter and receiver are unaware of the reconnaissance.
 This involves attacks against the confidentiality of the data that is being
transmitted across the network.
There are two types of eavesdropping:
I. Passive Eavesdropping: The malicious nodes detect the information by
listening to the message transmission in the wireless broadcasting medium.
II. Active Eavesdropping: The malicious nodes actively grab the information via
sending queries to transmitters by disguising themselves as friendly nodes.
Solution for Eavesdropping
o The best way to keep your traffic secure while on Wi-Fi
hotspots is to connect to a Virtual Private Network (VPN),
maybe to your work’s network, a server you set up at your
home, or a hosted service designed specifically for
hotspot security, such as Private Wifi or Hotspot Shield.
o We must make sure any services or sites you use while on
the hotspot are secured with SSL encryption.
o The Enterprise mode of WPA2 security (also called the
802.1X or EAP mode) requires an authentication server,
commonly called a Remote Authentication Dial In User
Service (RADIUS) which prevents users from reading each
other’s traffic.
Denial of Service Attack
 A denial of service (DoS) attack is an assault that can
cripple or disable a WLAN. It can slow the network to
crawling speeds or actually force it to quit working.
 One form of DoS attack is the "brute force" method. This
can come in one of two forms:
I. A huge flood of packets that uses up all of the network's
resources and forces it to shut down.
II. A very strong radio signal that totally dominates the
airwaves and renders access points and radio cards
useless.
Wlan security
Solution for Denial of Service
Attack
This type of attack can be prevented by:
o implementing and updating firewalls.
o maintaining updated virus protection.
o ensuring strong passwords and deploy DoS detection tools,
such as AirDefense and AirMagnet in addition.
o You can protect a WLAN against DoS attacks by making the
building as resistive as possible to incoming radio signals.
Rogue Access Points
 Rogue APs can be APs that are connected to the enterprise wired LAN
without authorization or APs that are not connected to the wired LAN
but that accept associations from clients.
 Rogue APs can even be APs with a wireless card and a special
software package that makes them act as an AP.
Types of Rogue Aps based on security categories:
I. Non-malicious APs: The majority of the cases consist of someone
installing a rogue AP with the intent being not to bypass the
corporation's security policy but to deploy wireless as a convenience
or productivity enhancer.
II. Malicious Aps: the attacker sets up the AP to gain access to the wired
network or to disrupt the performance of the WLAN.
Rogue AP Detection
Prevention of Rogue APs
o Use of commercial tools like AirMagnet and AirDefence to
scan for rogue Aps periodically and verify their legitimacy.
o Using network Wireless Intrusion Prevention System (WIPS)
to watch the air or by using a host-resident Wireless IPS to
monitor client activity.
o Use of WLAN analyzer for Rogue AP detection.
o Smaller businesses on more limited budgets may prefer to
install stand-alone host WIPS programs like Sana Security
Primary Response Air Cover.
Wlan security

More Related Content

PDF
Wi-fi Hacking
PPT
UTM Unified Threat Management
PPT
4_5949547032388570388.ppt
PPTX
WEP/WPA attacks
PPTX
Security Threats at OSI layers
PPTX
Module 5 Wireless Network Design Considerations
DOC
Solutions crypto4e
PPTX
Wireless network security
Wi-fi Hacking
UTM Unified Threat Management
4_5949547032388570388.ppt
WEP/WPA attacks
Security Threats at OSI layers
Module 5 Wireless Network Design Considerations
Solutions crypto4e
Wireless network security

What's hot (20)

PPT
Wireless LAN security
PPTX
Wifi Security
PPTX
Wireless lan security
PPTX
Wireless network
PPTX
WiFi Secuiry: Attack & Defence
PPTX
Wi Fi Security
PPTX
Wireless network security
PPTX
Wireless LAN Security
PPTX
Firewall
PPTX
Wireless Network security
PPTX
Wi-Fi Architecture
PPTX
Wpa vs Wpa2
PPTX
Wireless technology
PPTX
WiFi Technology
PDF
Mobile network structure
PPTX
PPT
PPTX
Wi fi security
PPT
Wireless security presentation
Wireless LAN security
Wifi Security
Wireless lan security
Wireless network
WiFi Secuiry: Attack & Defence
Wi Fi Security
Wireless network security
Wireless LAN Security
Firewall
Wireless Network security
Wi-Fi Architecture
Wpa vs Wpa2
Wireless technology
WiFi Technology
Mobile network structure
Wi fi security
Wireless security presentation
Ad

Viewers also liked (8)

PDF
Gigabit Wi-Fi 802.11AC In Depth
PPTX
802.11ac Overview
PPT
Wlan security
PDF
Wireless LAN Security, Policy, and Deployment Best Practices
PDF
IEEE 802 Standard for Computer Networks
PPT
How To Hack Wireless Internet Connections
PDF
Wireless Hacking
PDF
Wireless Networking Security
Gigabit Wi-Fi 802.11AC In Depth
802.11ac Overview
Wlan security
Wireless LAN Security, Policy, and Deployment Best Practices
IEEE 802 Standard for Computer Networks
How To Hack Wireless Internet Connections
Wireless Hacking
Wireless Networking Security
Ad

Similar to Wlan security (20)

PPTX
Wireless LAN Security by Arpit Bhatia
PDF
Securing the Use of Wireless Fidelity (WiFi) in Libraries
PPTX
Wireless_Networks_Paragraph_Style_Final.pptx
PPT
Wireless LAN Deployment Best Practices
PDF
WiFi Intrustion Detection from WireShark SharkFest
PPTX
Wireless Security
PPT
254460979-ishant abcd-098765432222-1.ppt
PPTX
Chương 2_2_Final (1).pptxfffffffffffffffffffffff
PDF
White paper - Building Secure Wireless Networks
PDF
Wireless security
PPT
chapter 8.ppt
PPT
wireless lan security.ppt
DOCX
Annes Beauty Salon, Inc Income Statement For the Year 20XX
PPT
wireless lan security for their all details
PPTX
Module 6 Wireless Network security
PDF
Cisco SAFE_Wireless LAN Security in Depth v2
PPTX
Wireless Communication and MobileCo5.pptx
PPTX
Chapter 24 Wireless Network Security Systems
PPTX
501 ch 4 securing your network
PDF
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless LAN Security by Arpit Bhatia
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Wireless_Networks_Paragraph_Style_Final.pptx
Wireless LAN Deployment Best Practices
WiFi Intrustion Detection from WireShark SharkFest
Wireless Security
254460979-ishant abcd-098765432222-1.ppt
Chương 2_2_Final (1).pptxfffffffffffffffffffffff
White paper - Building Secure Wireless Networks
Wireless security
chapter 8.ppt
wireless lan security.ppt
Annes Beauty Salon, Inc Income Statement For the Year 20XX
wireless lan security for their all details
Module 6 Wireless Network security
Cisco SAFE_Wireless LAN Security in Depth v2
Wireless Communication and MobileCo5.pptx
Chapter 24 Wireless Network Security Systems
501 ch 4 securing your network
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf

Recently uploaded (20)

PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PDF
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PDF
Course Overview and Agenda cloud security
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPTX
The-Importance-of-School-Sanitation.pptx
PPTX
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPTX
10.2981-wlb.2004.021Figurewlb3bf00068fig0001.pptx
PPT
12 Things That Make People Trust a Website Instantly
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
PPTX
Reading as a good Form of Recreation
PPTX
Artificial_Intelligence_Basics use in our daily life
PDF
Containerization lab dddddddddddddddmanual.pdf
PDF
simpleintnettestmetiaerl for the simple testint
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
Course Overview and Agenda cloud security
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Alethe Consulting Corporate Profile and Solution Aproach
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
The-Importance-of-School-Sanitation.pptx
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
10.2981-wlb.2004.021Figurewlb3bf00068fig0001.pptx
12 Things That Make People Trust a Website Instantly
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
Reading as a good Form of Recreation
Artificial_Intelligence_Basics use in our daily life
Containerization lab dddddddddddddddmanual.pdf
simpleintnettestmetiaerl for the simple testint

Wlan security

  • 1. Wireless LAN Security Kasturi Chakraborty Shreosi Maitra Suvadip Banerjee Upasona Roy Presented by
  • 2. CONTENTS  Introduction  Wireless LAN Technology Options  Types of Wireless LANs  Basic Configuration  Standards  Advantages and Disadvantages  Security issues and Solutions
  • 3. Introduction  Wireless LAN is a flexible communication system implemented as an extension to a wired LAN, using electromagnetic waves to transmit and receive data over air, minimizing the need for wired connections.  It is a communication network that provides connectivity to wireless devices within a limited geographic area such as home, school, single office, building or campus.  "Wi-Fi" is the universal standard for wireless networks and is the wireless equivalent of wired Ethernet networks.
  • 4. Wireless LAN Technology Options o Narrowband Technology o Spread Spectrum Technology o Frequency-Hopping Spread Spectrum Technology o Direct Sequence Spread Spectrum Technology o Infrared Technology
  • 7. Standards 1) IEEE 802.11 2) IEEE 802.11b 3) IEEE 802.11a 4) IEEE 802.11g 5) IEEE 802.11n 6) IEEE 802.11ac
  • 8. Advantages Key drivers are mobility and accessibility. Increased Productivity. Improved collaboration. No need to reconnect to the network. Flexible installation and scalability.
  • 9. Disadvantages Very expensive. Signal bleed over. Environmental conditions. Less capacity.
  • 10. Is it Secure?  Someone can block the entire radio communication channel by transmitting junk on certain frequencies and anonymously stage a denial of service attack from your network.  Anybody can plant viruses on our system.  The webpages can be changed.  As the number of WLAN cards grows so will the opportunities for hackers to break into the wireless networks.  Regardless of the technology used , WLAN security will always be limited because users will sidestep security features.
  • 11. Security Issues & Solutions  War Driving  Eavesdropping  Denial of Service Attack  Rogue Access Points
  • 12. War Driving(Access Point Mapping)  It is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere using a portable computer, smartphone or personal digital assistant (PDA).  Wireless NIC scans for wireless access points . The computer looks for SSID (wireless network name) which is being constantly transmitted by the access point , letting the computers know of its presence.  The wiredriver uses software like NetStumbler (Windows) or Kismet (Linux) to scan the airwaves for SSIDS.  The wiredriver generally configures his/her software to log any strong unencrypted signal using GPS receiver and connect to the access point.
  • 13. Basic Configuration of War Driving
  • 14. Solution for War Driving o Do not broadcast your SSID. o Change the default password. o Encrypt your wireless connection using the encryption schemes. o Filter the MAC addresses that are allowed to connect to your router. o If you configure file sharing on your computer, make sure it is password protected. o Use personal firewall software.
  • 15. Eavesdropping  In wireless sensor networks ,any wireless network residing in the transmission range of the transmitter can potentially decode the signal when both the transmitter and receiver are unaware of the reconnaissance.  This involves attacks against the confidentiality of the data that is being transmitted across the network. There are two types of eavesdropping: I. Passive Eavesdropping: The malicious nodes detect the information by listening to the message transmission in the wireless broadcasting medium. II. Active Eavesdropping: The malicious nodes actively grab the information via sending queries to transmitters by disguising themselves as friendly nodes.
  • 16. Solution for Eavesdropping o The best way to keep your traffic secure while on Wi-Fi hotspots is to connect to a Virtual Private Network (VPN), maybe to your work’s network, a server you set up at your home, or a hosted service designed specifically for hotspot security, such as Private Wifi or Hotspot Shield. o We must make sure any services or sites you use while on the hotspot are secured with SSL encryption. o The Enterprise mode of WPA2 security (also called the 802.1X or EAP mode) requires an authentication server, commonly called a Remote Authentication Dial In User Service (RADIUS) which prevents users from reading each other’s traffic.
  • 17. Denial of Service Attack  A denial of service (DoS) attack is an assault that can cripple or disable a WLAN. It can slow the network to crawling speeds or actually force it to quit working.  One form of DoS attack is the "brute force" method. This can come in one of two forms: I. A huge flood of packets that uses up all of the network's resources and forces it to shut down. II. A very strong radio signal that totally dominates the airwaves and renders access points and radio cards useless.
  • 19. Solution for Denial of Service Attack This type of attack can be prevented by: o implementing and updating firewalls. o maintaining updated virus protection. o ensuring strong passwords and deploy DoS detection tools, such as AirDefense and AirMagnet in addition. o You can protect a WLAN against DoS attacks by making the building as resistive as possible to incoming radio signals.
  • 20. Rogue Access Points  Rogue APs can be APs that are connected to the enterprise wired LAN without authorization or APs that are not connected to the wired LAN but that accept associations from clients.  Rogue APs can even be APs with a wireless card and a special software package that makes them act as an AP. Types of Rogue Aps based on security categories: I. Non-malicious APs: The majority of the cases consist of someone installing a rogue AP with the intent being not to bypass the corporation's security policy but to deploy wireless as a convenience or productivity enhancer. II. Malicious Aps: the attacker sets up the AP to gain access to the wired network or to disrupt the performance of the WLAN.
  • 22. Prevention of Rogue APs o Use of commercial tools like AirMagnet and AirDefence to scan for rogue Aps periodically and verify their legitimacy. o Using network Wireless Intrusion Prevention System (WIPS) to watch the air or by using a host-resident Wireless IPS to monitor client activity. o Use of WLAN analyzer for Rogue AP detection. o Smaller businesses on more limited budgets may prefer to install stand-alone host WIPS programs like Sana Security Primary Response Air Cover.

Editor's Notes

  • #5: To be explained by the presenter(each & every LAN technology