Lecture 5 - Network Security 2 (Wireless Security)
Lecture 5 - Network Security 2 (Wireless Security)
Spring – 2025
8th Semester
Lecture 5
Wireless Security
Lecturer: Baqi Bellah Usmani
Contents
802.11n (Wi-Fi 4) Up to 600 Mbps 2.4/5 GHz Medium speed, common in offices
• There are four main wireless-security protocols. These protocols were developed by the
Wi-Fi Alliance, an organization that promotes wireless technologies and interoperability.
Types of Wireless Security Protocols…
Full Name Wired Equivalent Privacy Wi-Fi Protected Access Wi-Fi Protected Access II Wi-Fi Protected Access III
Encryption Algorithm RC4 TKIP (uses RC4) AES (CCMP) AES-GCMP, 192-bit (Enterprise)
Key Size 64/128-bit 128-bit 128-bit or 256-bit AES 192-bit AES (Enterprise)
PSK (Pre-Shared Key) / SAE (Simultaneous
Authentication Shared Key PSK / EAP
EAP Authentication of Equals) / EAP
Security Level Weak (easily broken) Moderate (deprecated) Strong Very Strong
Easily cracked via IV Susceptible to Resistant to brute-force and
Vulnerabilities KRACK (patched)
reuse dictionary attacks eavesdropping
New routers and updated
Device Support Very old devices only Some legacy devices Most modern routers and devices
devices only
Some old Secure modern networks and
Common Use Cases Obsolete hardware Home/Enterprise Wi-Fi (mainstream)
networks/devices IoT
WPA2
WPA3
Wireless security threats and risks
Threat Description & Example
• Password Change: One basic best practice for Wi-Fi security is to change
default passwords for network device.
• MAC Address: Another basic approach to Wi-Fi security is to use MAC
addresses, which restrict access to a Wi-Fi network. While this tactic provides a
higher measure of security than an open network.
• Encryption: A more common method of protecting Wi-Fi networks and devices is
the use of security protocols that utilize encryption. Encryption in digital
communications encodes data and then decodes it only for authorized recipients.
Such as WPA2 or WPA3
• VPNs: VPNs are another source of Wi-Fi network security. They allow users to
create secure, identity-protected tunnels between unprotected Wi-Fi networks
and the internet.
• Security Passwords: There are many types of consumer and enterprise
software that also can provide Wi-Fi security. Some Wi-Fi protection software is
bundled with related products, such as antivirus software.
Thank You