Types of Attacks-Wireless Networks-Lecture Slides, Slides for Wireless Networking. Amrita Vishwa Vidyapeetham

Wireless Networking

Description: This course consist on introduction to wireless communication, evolution of wireless communication systems, medium access techniques, propagation models, error control techniques, cellular systems, emerging networks. This lecture inlcudes: Types, Attacks, Passive, Active, Inject, Decrypt, Statistical, Analysis, Dictionary, Building
Showing pages  1  -  4  of  25
2
Outlines
Types of Attack
Goals of 802.11 Security
WEP Protocol
WEP Authentication
Security flaws in original 802.11
802.1x Security
AKM Operations with AS
AKM operations with PSK
IBSS Security model
docsity.com
3
Last Lecture
Introduction
What is Ad hoc networks?
Characteristic (Heterogeneous, Self-creating, self-organizing,
self-adminstrating, on-the-fly)
Ad hoc vs. cellular networks
Challenges (Spectrum allocation, Self-configuration, Medium
access control (MAC), Energy efficiency, TCP Performance,
Mobility management, Security & privacy, Routing protocols,
Multicasting, QoS, Service Location, Provision, Access)
Routing Protocol
Expected Properties of Ad-hoc Routing Protocols
A taxonomy for routing protocols in Mobile ad
Some common protocols (DSDV, AODV, DSR, ZRP, TORA)
docsity.com
4
Types of Attacks
Passive attacks
to decrypt traffic based on statistical analysis
Active attacks
To inject new traffic from authorized mobile stations,
based on known plaintext
Active attacks
To decrypt traffic, based on tricking the access point
Dictionary building attacks
Allows real-time automated decryption of all traffic
docsity.com
5
802.11 Security
Goals of 802.11 security
Access Control
Ensure that your wireless infrastructure is not used.
Data Integrity
Ensure that your data packets are not modified in transit.
Confidentiality
Ensure that the contents of your wireless traffic is not
learned
802.11 security consists of two subsystems
A data encapsulation technique called Wired
Equivalent Privacy (WEP)
An authentication algorithm called Shared Key
Authentication
docsity.com
The preview of this document ends here! Please or to read the full document or to download it.
Document information
Uploaded by: shaje_69kinky
Views: 906
Downloads : 0
Address:
University: Amrita Vishwa Vidyapeetham
Upload date: 07/08/2012
Embed this document:
Docsity is not optimized for the browser you're using. In order to have a better experience please switch to Google Chrome, Firefox, Internet Explorer 9+ or Safari! Download Google Chrome