60 likes | 146 Vues
Learn about WLAN security challenges including rogue access points, denial of service attacks, and eavesdropping. Explore security technologies like WEP and WPA, and discover alternative solutions such as IEEE 802.1x and VPN for enhanced network protection. Join the discussion on maintaining confidentiality, integrity, and availability in wireless networks.
E N D
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011
Why Network Security? • Confidentiality • protected from attackers • Integrity • information was not compromised • Availability • unauthorized access /DoS Hosam Badreldin – Fall 2011
Security issues/problems • Rogue Access Points • Denial of Service • Eavesdropping • MAN-in-the-Middle • War Driving • Signal Jamming Hosam Badreldin – Fall 2011
Security technologies 1- SSID • Passive scan 2- Mac Address authentication • Spoofing 1- Wired Equivalent Privacy (WEP) • Manual Key Management • Initialization vector Encryption • WEP key is combined with a 24-bit IV to create the key 2- Wi-Fi Protected Access (WPA) • Enhancement for WEP (48-bit IV) • TKIP: Temporal Key Encryption Protocol (Key per pkt) • PSK/802.1x authentication Hosam Badreldin – Fall 2011
Alternative solutions • IEEE 802.1x • Availability • VPN • Confidentiality/Integrity • Cisco LEAP (Light Weight Authentication Protocol) • Availability • SSL (Secure Socket Layer) • Confidentiality/Integrity Hosam Badreldin – Fall 2011
Questions & Comments Hosam Badreldin - Fall 2011