Wi fi protected access

17
Lopamudra Das

description

This is the the technology which is very basic understanding on Wi- Fi technology.. What is Wi-Fi technology and how is working and also the advantages of wi-fi.....

Transcript of Wi fi protected access

Page 1: Wi fi protected access

Lopamudra Das

Page 2: Wi fi protected access

CONTENTS

: WHAT IS WPA

: HISTORY OF WPA

: CONCEPT OF WPA

: WI-FI PROTECTED ACCESS -2

: GENERAL RECOMMENDATIONS

:ADVANTAGES & LIMITATION OF WPA

: CONCLUSION

: REFERENCIES

Page 3: Wi fi protected access

What is WPA?

Wi-Fi Protected Access (WPA) is a response by the WLAN industry to offer an immediate, a stronger security solution.

WPA is intended to be: A software/firmware upgrade to existing access

points and NICs. Inexpensive in terms of time and cost to

implement. Compatible with vendors. Suitable for enterprise, small sites, home

networks. Runs in enterprise mode or pre-shared

key(PSK mode)

Page 4: Wi fi protected access

History of WPA

WPA was created by the Wi-Fi Alliance, an industry trade group, which owns the trademark to the Wi-Fi name and certifies devices that carry that name.

WPA is designed for use with an IEEE 802.1X authentication server, which distributes different keys to each user.

Page 5: Wi fi protected access

History of WPA

The Wi-Fi Alliance created WPA to enable introduction of standard-based secure wireless network products prior to the IEEE 802.11i group finishing its work.

The Wi-Fi Alliance at the time already anticipated the WPA2 certification based on the final draft of the IEEE 802.11i standard.

Page 6: Wi fi protected access

concept of WPA

Data is encrypted using the RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV).

One major improvement in WPA is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used.

When combined with the much larger IV, this defeats the well-known key recovery attacks on WEP.

Page 7: Wi fi protected access

General Recommendations

Conduct a risk assessment for all information that will travel over the WLAN and restrict sensitive information.

Policies and infrastructure for authenticating remote access users can be applied to WLAN users.

Perform regular audits of the WLAN using network management and RF detection tools.

Page 8: Wi fi protected access

*Minimize signal leakage through directional antennas and placement of access points.

*Make sure all equipment being purchased can be upgraded to support WPA and WPA 2/AES.

*If using Pre-Shared Key Mode consider that the shared secret may become compromised.

Page 9: Wi fi protected access
Page 10: Wi fi protected access

TKIP encryption, 802.1X/EAP authentication and PSK technology in WPA are features that have been brought forward from WPA2.

Additionally, WPA2 provides a new, encryption scheme, the Advanced Encryption Standard (AES).

AES uses a mathematical ciphering algorithm that employs variable key sizes of 128-, 192- or 256-bits.

WPA2 offers a highly secure “mixed mode” that supports both WPA and WPA2 client workstations.

THE FUTURE WAP 2

Page 11: Wi fi protected access

It’s flexible: With a wireless network you and your staff can have uninterrupted access to people, information and tools as you and they move through the workplace with your mobile PC. It’s responsive: As you change your business operations your wireless network can change with you.

 It’s customized: Your wireless network can be configured the way you want it.-even combined with your current wired network 

 

  

 

ADVANTAGES

Page 12: Wi fi protected access

It’s fast: From 11 to 54 Mbps throughput and advanced roaming capabilities provide reliable access to e-mail, the Internet, file sharing and other network resources away from the desk. It’s cost-effective: Expand and extend your existing network by simply adding more adapters and access points. Planning is a no brainier as you need to buy only what you need. It’s secure: Current standards utilizes 64- and 128-bit WEP encryption and help guard the network from intruders and protect data in transit. Add in technology and you have increased WLAN protection important for mission-critical data.  

Page 13: Wi fi protected access

* It has a limited bandwidth of about 83.5 MHz.

 

*Frequency spectrum used by IEEE 802.11b is shared by many

other systems like microwave ovens, cordless phones etc. This frequency sharing causes interference problem.

 

* Security techniques are not reliable yet.

 

LIMITATION

Page 14: Wi fi protected access

1. Internet access.

 

2. City wide Wi-Fi.

 

3. Campus wide Wi-Fi.

 

4. Direct computer to computer communication.

 

APPLICATION

Page 15: Wi fi protected access

As a subset of WPA2, WPA presents users with a solution that is both forward- and backward-compatible with present and future wireless standards.

It offers enterprise-grade protection and, most importantly, it is available today. WPA allows users, whether they are at home or at work, to enjoy all the mobility and flexibility that Wi-Fi wireless computing has to offer, knowing that their data is safely protected beyond the reach of intruders.

conclusion

Page 16: Wi fi protected access

References

“Overview of IEEE 802.11 Security”, www.techonline.com.   www.wikipedia.org   www.lib-asc.ekm.org   www.wi-fi.org   Paper on Wi-Fi security from the Wi-Fi alliance.   www.entecollege.com   www.ieeespectrum.com

Page 17: Wi fi protected access

THANK YOU