0% found this document useful (0 votes)
4 views12 pages

Lecture 5 - Network Security 2 (Wireless Security)

The document outlines the fundamentals of wireless security, including its purpose, types of wireless technologies, and various security protocols such as WEP, WPA, WPA2, and WPA3. It discusses the threats and risks associated with wireless networks, including eavesdropping and unauthorized access, as well as methods to protect these networks, such as changing default passwords and using encryption. The content is part of a lecture on wireless security for the 8th semester of a computer science program at Benawa Institute of Higher Education.

Uploaded by

afghanp441
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views12 pages

Lecture 5 - Network Security 2 (Wireless Security)

The document outlines the fundamentals of wireless security, including its purpose, types of wireless technologies, and various security protocols such as WEP, WPA, WPA2, and WPA3. It discusses the threats and risks associated with wireless networks, including eavesdropping and unauthorized access, as well as methods to protect these networks, such as changing default passwords and using encryption. The content is part of a lecture on wireless security for the 8th semester of a computer science program at Benawa Institute of Higher Education.

Uploaded by

afghanp441
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Benawa Institute of Higher Education

Computer Science Faculty

Spring – 2025
8th Semester

Lecture 5

Wireless Security
Lecturer: Baqi Bellah Usmani
Contents

• What is Wireless Security?


• Wireless Network Standards
• Types of Wireless Security Protocols
• Wireless security threats and risks
• Ways to Protect Wireless Networks
• Practical (Demo)
Wireless Network Security
Wireless network security is the practice of protecting a wireless computer network from
unauthorized access, misuse, or data theft.
It is a subset of network security focused specifically on securing data transmitted over Wi-
Fi and other wireless technologies.
Purpose: To prevent unauthorized users from accessing or manipulating the network and
ensure that legitimate users can communicate securely.
How It Works: Security is typically enforced using
wireless routers or access points that provide:
Encryption (e.g., WPA2, WPA3) to protect data in
transit. Authentication (e.g., passwords or
certificates) to control access. Firewalls and
monitoring tools to detect and prevent threats.
More about Wireless Network
1. Types of wireless technology:
• Wi-Fi is best for local high-speed data sharing and internet.
• Bluetooth is ideal for short-range peripheral connections.
• Zigbee is designed for low-power applications in smart environments. Mostly in sensors
• LTE provides wide-area mobile coverage for continuous connectivity.
2. Components: Access Points (APs), Wireless Clients, Routers.
3. Frequencies: 2.4 GHz and 5 GHz bands (used in Wi-Fi).
• 2.4 GHz Band:
Wider range but lower speed; more interference. Older routers.
• 5 GHz Band:
Faster speed, shorter range, less interference. Modern dual-band routers.
• 6 GHz Band (Wi-Fi 6E):
Even faster, newer frequency with minimal congestion.
4. Standards: IEEE 802.11 a/b/g/n/ac/ax.
Wireless Network Standards

Standard Speed Frequency Example Use

802.11b/g 11–54 Mbps 2.4 GHz Basic home Wi-Fi

802.11n (Wi-Fi 4) Up to 600 Mbps 2.4/5 GHz Medium speed, common in offices

802.11ac (Wi-Fi 5) Up to 1.3 Gbps 5 GHz High-speed Wi-Fi

802.11ax (Wi-Fi 6) Up to 10 Gbps 2.4/5/6 GHz Modern homes and enterprises


802.11be (Wi-Fi 7) Up to 46 Gbps 2.4/5/6 GHz GHz Modern homes and enterprises
Types of Wireless Security Protocols

• There are four main wireless-security protocols. These protocols were developed by the
Wi-Fi Alliance, an organization that promotes wireless technologies and interoperability.
Types of Wireless Security Protocols…

Feature WEP WPA WPA2 WPA3

Full Name Wired Equivalent Privacy Wi-Fi Protected Access Wi-Fi Protected Access II Wi-Fi Protected Access III

Year Introduced 1997 2003 2004 2018

Encryption Algorithm RC4 TKIP (uses RC4) AES (CCMP) AES-GCMP, 192-bit (Enterprise)

Key Size 64/128-bit 128-bit 128-bit or 256-bit AES 192-bit AES (Enterprise)
PSK (Pre-Shared Key) / SAE (Simultaneous
Authentication Shared Key PSK / EAP
EAP Authentication of Equals) / EAP
Security Level Weak (easily broken) Moderate (deprecated) Strong Very Strong
Easily cracked via IV Susceptible to Resistant to brute-force and
Vulnerabilities KRACK (patched)
reuse dictionary attacks eavesdropping
New routers and updated
Device Support Very old devices only Some legacy devices Most modern routers and devices
devices only
Some old Secure modern networks and
Common Use Cases Obsolete hardware Home/Enterprise Wi-Fi (mainstream)
networks/devices IoT
WPA2
WPA3
Wireless security threats and risks
Threat Description & Example

Intercepting data (e.g., capturing passwords on


Eavesdropping
public Wi-Fi with sniffing tools).
Unauthenticated users gain entry (e.g., using
Unauthorized Access
default Wi-Fi passwords).
Fake access points trick users (e.g., "Free Wi-
Rogue APs
Fi" capturing data).
Attacker sits between sender and receiver (e.g.,
MitM Attacks
Evil Twin AP steals credentials).
Network flooding causes outages (e.g.,
DoS Attacks
jamming signals or request floods).
Faking device ID to bypass filters (e.g.,
MAC Spoofing
accessing restricted school Wi-Fi).
Use of outdated protocols like WEP (e.g.,
Weak Encryption
easily cracked using Aircrack-ng).
Ways to Protect Wireless Networks

• Password Change: One basic best practice for Wi-Fi security is to change
default passwords for network device.
• MAC Address: Another basic approach to Wi-Fi security is to use MAC
addresses, which restrict access to a Wi-Fi network. While this tactic provides a
higher measure of security than an open network.
• Encryption: A more common method of protecting Wi-Fi networks and devices is
the use of security protocols that utilize encryption. Encryption in digital
communications encodes data and then decodes it only for authorized recipients.
Such as WPA2 or WPA3
• VPNs: VPNs are another source of Wi-Fi network security. They allow users to
create secure, identity-protected tunnels between unprotected Wi-Fi networks
and the internet.
• Security Passwords: There are many types of consumer and enterprise
software that also can provide Wi-Fi security. Some Wi-Fi protection software is
bundled with related products, such as antivirus software.
Thank You

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy