Synopsis Report of Cyber Crime
-
Upload
anand-dhawan -
Category
Documents
-
view
216 -
download
0
Transcript of Synopsis Report of Cyber Crime
-
8/8/2019 Synopsis Report of Cyber Crime
1/2
Synopsis Report on
Wi-Fi Security WEP, WPA and WPA2
By - Anand (7450070080)
Sr. No. 52
Objective
1. To understand the security issues of Wi-Fi network.2. To understand and study the different security techniques with their
weaknesses.3. To find out the pros and cons of Wi-Fi networks.
Introduction
Wi-Fi short for Wireless Fidelity and is used generally to refer any type of
802.11 network, whether 802.11b, 802.11a, 802.11g, dual -band, etc. Wi-Fi is awireless technology that uses radio frequency to transmit data through the air. Itis an alternative to Wired Technology, which is commonly used, for connecting
devices in wireless mode.
As Wi-Fi uses that uses radio frequency to transmit data through the air , thus itssignal can be easily received by any devices and data can be easily interpreted,
thus it requires some security methods or techniques to secure the Wi-Fi
networks.Some of Wi-Fi security techniques are:
Service Set Identifier (SSID) Wired Equivalent Privacy (WEP) 802.1X Access Control Wireless Protected Access (WPA and WPA2) IEEE 802.11i
Abstract
Wi-Fi is a Great solution for
y Home LANy Office LANy Periodic Event LAN, conferences, trade shows
-
8/8/2019 Synopsis Report of Cyber Crime
2/2
It is becoming popular day by day, but with the increasing popularity Wi-Fi
security is also becoming a serious issue.
Therefore to handle these issues some security techniques have been developed
Some of the techniques are:
Wired Equivalent Privacy (WEP) Wireless Protected Access
WPA WPA2
Wired Equivalent Privacy (WEP)
WEP security solution was originally offered by IEEE 802.11 standard. It
provide security same as wired network.
It uses RC4 encryption with pre-shared keys and 24 bit initialization vectors(IV).
Security Issue with WEP
Short IV Static key
Wireless Protected AccessWPA is a specification of standard based, interoperable security enhancementsthat strongly increase the level of data protection and access control for existing
and future wireless LAN system.
It is of two types:
WPA-PSK
It uses pre-shared key and TKIP (Temporal Key Integrity Protocol) encryption
and fixes all issues found in WEP. It is useful for SOHO (Small Office Home)environments. It provides single master key for all users. TKIP providesdynamic encryption keys.
WPA Enterprise
WPA Enterprise or WPA2 introduced some fundamental changes as separating
user authentication from enforcing message integrity and privacy, thus
providing robust and scalable security architecture equally suitable for homenetworks and large corporate systems.