Synopsis Report of Cyber Crime

download Synopsis Report of Cyber Crime

of 2

Transcript of Synopsis Report of Cyber Crime

  • 8/8/2019 Synopsis Report of Cyber Crime

    1/2

    Synopsis Report on

    Wi-Fi Security WEP, WPA and WPA2

    By - Anand (7450070080)

    Sr. No. 52

    Objective

    1. To understand the security issues of Wi-Fi network.2. To understand and study the different security techniques with their

    weaknesses.3. To find out the pros and cons of Wi-Fi networks.

    Introduction

    Wi-Fi short for Wireless Fidelity and is used generally to refer any type of

    802.11 network, whether 802.11b, 802.11a, 802.11g, dual -band, etc. Wi-Fi is awireless technology that uses radio frequency to transmit data through the air. Itis an alternative to Wired Technology, which is commonly used, for connecting

    devices in wireless mode.

    As Wi-Fi uses that uses radio frequency to transmit data through the air , thus itssignal can be easily received by any devices and data can be easily interpreted,

    thus it requires some security methods or techniques to secure the Wi-Fi

    networks.Some of Wi-Fi security techniques are:

    Service Set Identifier (SSID) Wired Equivalent Privacy (WEP) 802.1X Access Control Wireless Protected Access (WPA and WPA2) IEEE 802.11i

    Abstract

    Wi-Fi is a Great solution for

    y Home LANy Office LANy Periodic Event LAN, conferences, trade shows

  • 8/8/2019 Synopsis Report of Cyber Crime

    2/2

    It is becoming popular day by day, but with the increasing popularity Wi-Fi

    security is also becoming a serious issue.

    Therefore to handle these issues some security techniques have been developed

    Some of the techniques are:

    Wired Equivalent Privacy (WEP) Wireless Protected Access

    WPA WPA2

    Wired Equivalent Privacy (WEP)

    WEP security solution was originally offered by IEEE 802.11 standard. It

    provide security same as wired network.

    It uses RC4 encryption with pre-shared keys and 24 bit initialization vectors(IV).

    Security Issue with WEP

    Short IV Static key

    Wireless Protected AccessWPA is a specification of standard based, interoperable security enhancementsthat strongly increase the level of data protection and access control for existing

    and future wireless LAN system.

    It is of two types:

    WPA-PSK

    It uses pre-shared key and TKIP (Temporal Key Integrity Protocol) encryption

    and fixes all issues found in WEP. It is useful for SOHO (Small Office Home)environments. It provides single master key for all users. TKIP providesdynamic encryption keys.

    WPA Enterprise

    WPA Enterprise or WPA2 introduced some fundamental changes as separating

    user authentication from enforcing message integrity and privacy, thus

    providing robust and scalable security architecture equally suitable for homenetworks and large corporate systems.