Chapter Five: Security in Wireless Communication
Chapter Five: Security in Wireless Communication
Chapter Five: Security in Wireless Communication
Main Contents
●
The Need for wireless network security
●
Security threats in wireless networks
●
Wireless Security management Protocols
●
WAP, WEP and WPA2
●
Virtual private network (VPN)
The Need for wireless network security
●
What is Security – any activity designed to protect the usability and
integrity of a network system and data. It includes both hardware and
software technologies.
●
The issue of security in a wireless networks is critical as the medium is an
open and very venerable to security threats
●
Security professionals spend more time on protecting their system and make
the following determinations:
1) Who will have access to data?
2) What resources will users have access to?
3) When will users access resources?
●
Decisions depend on the organization we are serving, because some
resources can be trusted more than others.
The Need for wireless network security..(Con’t)
●
Wireless Communication system are becoming more widely
recognized as a general-purpose connectivity alternative for a
broad range of business customers.
●
But insecure and the data sent over the them can be easily broken
and compromised.
●
Any computer network, wireless or Wire-line, is subject to
substantial security risks, mainly
1) Threats to the physical security
2) Privacy
3) Unauthorized access by unwanted parties
The Need for wireless network security (Cont’d)
Why we need security ?
●
There must be Strong level of security in any Communication
system, especially in Wireless network/system. because data carried
in the networks are sensitive, especially on the networks of financial
institutions and banks and e-commerce, e-government, and military
networks. → Confidentiality and Privacy!
●
The security issue in wireless networks is much more critical than in
wired networks, because data sent on a wireless system is quite
literally broadcast for the entire computing entity to hear.
●
Generally, we need security to ensure ”SECURITY OBJECTIVES”
The Need for wireless network security (Cont’d)
When performing security tasks, security professionals try to protect
their environments as effectively as possible to maintain CIA
1) Confidentiality: Ensure that no data is disclosed(make known)
intentionally or unintentionally.
2) Integrity: Make sure that:
->No data is modified by unauthorized personnel,
->No unauthorized changes are made by authorized personnel, and
->The data remains consistent, both internally and externally.
3) Availability: Provide reliable and timely access to data and
resources.
Security attacks in Wireless Network
•
Security attacks :An attempt to gain unauthorized access
of computing assets of an entity with the objective of stealing
data or perform other malicious activity.
Security attacks in Wireless Network ..(Cont’d)
1) Active attacks: An Active attack attempts to alter system
resources or effect their operations. It involve some modification
of the data stream or creation of false statement. And further
classified as:
1) Masquerade : occurs when one entity pretends to be a different
entity.
Security attacks in Wireless Network ..(Cont’d)
1) Active attacks…cont’d
2) Reply: the passive capture of a data unit and its subsequent
re-ransmission to construct unwanted access.
Security attacks in Wireless Network ..(Cont’d)
1) Active attacks…cont’d
3) Modification of messages: It means that some portion of a message
is altered or that message is delayed or reordered to produce an
unauthorised effect.
Security attacks in Wireless Network ..(Cont’d)
1) Active attacks…cont’d
4) Denial of service: service disruption, its normal function and prevents
other users from accessing it either by disabling the network or
overloading by flooding the entire network/server with traffic load until
the server get shutdown.
Security attacks in Wireless Network ..(Cont’d)
2)Passive Attack: Gaining access to a computing assets but
without making any change to the data, leaving it intact.
Passive Attack gaining access to a computing assets but without
making any change to the data, leaving it intact.
●
It is very difficult to detect b/c they don’t involve any alteration of
the data.
Categorized in to two:
1) The release of message content
2) Traffic analysis
Security attacks in Wireless Network ..(Cont’d)
2)Passive Attack:…Cont’d
1) The release of message content
Telephonic conversation, an electronic mail message or a transferred file may
contain sensitive or confidential information. We would like to prevent an opponent
from learning the contents of these transmissions.
Security attacks in Wireless Network ..(Cont’d)
2)Passive Attack:…cont’d
2) Traffic analysis: making analysis of the assets, E.g., check how many
number of messages send by the sender with same pattern to get the
location or origin of message. E.g., Kidnapping is a passive attack
Security attacks in Wireless Network ..(Cont’d)
In general, networks have security problems due to:
1) Sharing: resources are shared, more users have the potential
to access networked systems rather than just a single computer
node.
2) Complexity
3) Anonymity: A hacker or intruder can attack a network
system from hundreds of miles away.
4) Multiple point of attack.: When a file exists physically on a
remote host, it may pass many nodes in the network before
reaching the user.
Security attacks in Wireless Network ..(Cont’d)
Services of Security
●
Confidentiality:-is just protecting computing assets being carried by
the network from passive attacks is protecting traffic from a hacker who
attempts to analyze it.
●
Nonrepudiation:- This service prevents the sending or receiving party
from denying the sent or received message.
●
Authentication:-Ensure that the message is from an authentic source.
Ensure that the connection is not interfered with in a way that a third
party impersonates one of the authorized parties.
●
Access control:-Ensure only authorized parties can use the system.
●
These Services must be accurate and intelligent enough.
Security attacks in Wireless Network ..(Cont’d)
Open authentication
Wireless clients Authentication methods..(Cont’d)