Wireless Security full report
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#1
18-04-2010, 09:09 PM


Abstract:
Wireless networks are already widely used throughout the world. People rely on them to connect to each other without the need to fight with cables and worry about mobility. Wireless is used in environments ranging from homes to airports and large metropolitan areas. However, with all this flow of information through the air we need to take security measures. This is what Atanas Dyulgerov talked about. He gave a basic intro to Wireless and then concentrated on the different aspects of security. He listed the basic types of vulnerabilities and also explained standards to fill the security gaps, including encryption algorithms and standards for frequencies used to broadcast radio waves.

Presented By:
Atanas Dyulgerov

read full report
cssu-bgold/seminar and presentations/ppt/Wireless_Security.ppt

cssu-bgold/seminar and presentations/pdf/Wireless_Security.pdf
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#2
26-04-2011, 10:07 AM

Presented by:
ASHISH TRIPATHI


.ppt   Wireless security.ppt (Size: 4.21 MB / Downloads: 237)
Wireless security
WHY?
HOW?

Types of wireless devices
Wireless routers
Access points
Wireless Adapters
Wireless Phones
Other Devices
Wireless routers
Build in firewall
Internet and file sharing
Assign IP address
Work like a traffic police officer.
Access points
No firewall
Just forward the internet
Work as a door to internet
Wireless Adapters
Enable pc or laptop to access wireless signals or radio frequencies
Wireless Phones
Mostly smartphones and regular phones
Wireless connection
GSM(Global System for Mobile Communications)
CDMA(Code division multiple access)
WLAN
BLUETOOTH
Types of unauthorized access
Accidental association
Malicious association
Ad-hoc networks
Identity theft (MAC spoofing)
Man-in-the-middle attacks
Smartphone Mobile hacking
Accidental association
Miss-association or accidental deliberate
Accidental association
Miss-association or accidental deliberate
Malicious association
Fake Access point
Also called Soft AP’s
Ad-hoc networks
Peer to peer(p2p)
No server
How Security breach?
No authentication
No encryption
No firewall
Identity theft (MAC spoofing)
Used in network with mac filtering
Hacker find out mac address of an client
Hacker use that mac address to access that network and infect it.
Man-in-the-middle attacks
Smartphone Mobile hacking
GPRS Hacking
SMS Hacking
Bluetooth Hacking
Mobile Phone Jammers
Cabir, believed to be the world's first worm that can spread on mobile phones using Bluetooth and WLAN
Trojan horses in games, screensavers and other applications -- resulting in false billing, unwanted disclosure of stored information, and deleted or stolen user data.
INDUSTRIAL LEVEL SECURITY
Wireless intrusion prevention system (WIPS)
Is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection), and can automatically take countermeasures (intrusion prevention).
WIPS implementation methods
WIPS configurations consist of three components:
Sensors —scan area with antennas and detectors
Server — analyzes packets captured by sensors
Console — The console provides the primary user interface into the system for administration and reporting
Wireless Security Best Practices
Basic prevention method
MAC ID filtering
Give network access to only selected mac address
Static IP addressing
Give access to selected IP address only
RF shielding
Shielding a area from unauthorized access using jammers and electro magnetic field
Advance prevention method
802.11 security
WEP(Wired Equivalent Privacy)
WPAv1(Wi-Fi Protected Access VERSION 1)
802.11i security
WPAv2(Wi-Fi Protected Access VERSION 2)
WEP(Wired Equivalent Privacy)
WEP WORKS ON
Open System authentication
Shared Key authentication
128 bit pre-shared key
The pre-shared WEP key is also used for encrypting the data frames flaws
packet spoofing reveals the key
No key management protocol
WPAv1(Wi-Fi Protected Access)
WPAv1

Just software/firmware upgrade is required
TKIP(Temporal Key Integrity Protocol)
combines the secret root key with the initialization vector
a sequence counter to protect against replay attacks
64-bit message integrity
flaws
Still uses same pre-shared key
Still packet spoofing available
WPAv2
WPAV2

New hardware was required
A pre-shared key was used for authentication
But dynamically generates a new key for each packet flaws
Still remains vulnerable to password cracking attacks if users rely on a weak passphrase
Reply
seminar flower
Super Moderator
******

Posts: 10,120
Joined: Apr 2012
#3
07-08-2012, 04:36 PM

Wireless Security


.pdf   1Wireless Security.pdf (Size: 304.24 KB / Downloads: 89)

Wireless Architecture

The obvious architecture is pure peer-to-peer
— each machine has a radio, and talks directly
to any other machine
n In fact, 802.11 (WiFi) can work that way, but
rarely does
n More common scenario: base stations (also
known as access points)

Access Points
An ordinary wireless node associates with an
access point (AP)
More precisely, it associates with the AP
having a matching network name (if specified)
and the strongest signal
If another AP starts sending a stronger signal
(probably because the wireless node has
moved), it will reassociate with the new access
point
All transmissions from the laptop go to the
access point
All transmissions to the laptop come from the
access point

Why This Works

Conventionally, we worry about authenticating
the client to the server Here, we need to authenticate the server to
the client
The infrastructure wasn’t designed for that;
more important, users don’t expect to check
for it (and have no way to do so in any event)

Key Setup for WEP

Each WEP node keeps a 24-bit packet counter
(the IV)
Actual cipher key is configured key
concatenated with counter
Two different flaws. . .
224 packets isn’t that many — you still get key
reuse when the packet counter overflows
RC4 has a cryptanalytic flaw

Packet Redirection

Suppose you know (or can guess) the
destination IP address of a packet
n Because RC4 is a stream cipher, you can make
controlled changes to the plaintext by flipping
ciphertext bits
n Flip the proper bits to send the packet to you
instead, and reinject it
n But it’s worse than that
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  web spoofing full report computer science technology 13 9,016 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  Security using colors and Armstrong numbers Moiz ansari 2 170 21-10-2015, 12:10 PM
Last Post: mkaasees
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,272 16-07-2015, 09:21 PM
Last Post: Guest
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,451 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 289 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 292 13-02-2015, 02:01 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 304 17-01-2015, 04:13 PM
Last Post: jaseelati
  wireless video service in cdma systems wikipedia jaseelati 0 385 13-01-2015, 04:29 PM
Last Post: jaseelati
  computational intelligence in wireless sensor networks ppt jaseelati 0 369 10-01-2015, 03:10 PM
Last Post: jaseelati
  global wireless e voting wikipedia jaseelati 0 314 18-12-2014, 03:19 PM
Last Post: jaseelati