Академический Документы
Профессиональный Документы
Культура Документы
Swagat Sourav
[1]
Introduction
It is also easy to interfere with wireless communications. A
simple jamming transmitter can make communications
impossible. For example, consistently hammering an
access point with access requests, whether successful or
not, will eventually exhaust its available radio frequency
spectrum and knock it off the network.
Advantages of WLAN
Disadvantages WLAN
Swagat Sourav
[2]
WLAN Authentication
Wireless LANs, because of their broadcast nature, require the
addition of:
User authentication
Data privacy
Authenticating wireless LAN clients.
[3]
WLAN Authentication
Types Of Authentication
Open Authentication
The authentication request
The authentication response
Swagat Sourav
[4]
Open Authentication
Open authentication provides no way for the access point to
determine whether a client is valid.
[5]
WEP Encryption
WEP is based on the RC4 algorithm, which is a symmetric
key stream cipher. The encryption keys must match on both
the client and the access point for frame exchanges to succeed
Stream Ciphers
[6]
WEP Encryption
Block Ciphers
[7]
Swagat Sourav
[8]
Swagat Sourav
[9]
[10]
Swagat Sourav
[11]
Swagat Sourav
[12]
Swagat Sourav
[13]
Conclusion
Wireless LAN deployments should be made as secure
as possible. Standard 802.11 security is weak and
vulnerable to numerous network attacks. This paper has
highlighted these vulnerabilities and described how it
can be solved to create secure wireless LANs.
Some security enhancement features might not be
deployable in some situations because of device
limitations such as application specific devices (ASDs
such as 802.11 phones capable of static WEP only) or
mixed vendor environments. In such cases, it is
important that the network administrator understand the
potential WLAN security vulnerabilities.
Swagat Sourav
[14]
Thank You!!!
Swagat Sourav
[15]