Wireless LAN Security FULL REPORT
#1

Wireless LAN Security



.pdf   wlan pdf.pdf (Size: 1.35 MB / Downloads: 113)

Introduction

Network components

Access Point : Bridges wireless client to the wired Ethernet network

STP (spanning tree, IEEE 802.1d) dynamic topology

Broadcast traffic like a hub

Clients or Stations

Two modes

Ad-hoc : direct connection between two WLAN interfaces of stations

Infrastructure : connection between AP and stations

Technology characteristics

Permanently send beacons (control frames) 10 times per second

Identify networks with a SSID (Service Set Identifier)

Encryption with WEP (Wired Equivalent Privacy)


Advantages and benefits of wireless LAN

Installation speed and simplicity

No need to ask anyone

No need to pull cable through walls or add hubs

Reduced Cost of Ownership

Initial hardware and set-up investment similar to wired LAN

Scalability and flexibility

Easy to grow and go everywhere

Mobility and roaming

Crossing obstacles

Temporary networks


Threats with wireless LANs

Unwanted or automatic connection to the wrong network

Theft of user authentication

Man-in-the-middle attack with a fake AP

Airjack

Theft of information by illegal tapping of the network

NetStumbler

Intrusion via the Wireless LANs

Scrambling of the WLAN

Airjack

Consumption of device batteries



WLAN security standards

IEEE 802.11g standard: 54 Mbits/s on 2.4 Ghz

Approved by the working group in February 2003

IEEE 802.11i standard: security in 802.11* networks

Use IEEE 802.1X port access control (April 2001)

CCMP (Counter-Mode/CBC-MAC Protocol)

TKIP (Temporal Key Integrity Protocol)

Dynamic key generation for WEP (Wired Equivalent Privacy)

WRAP (Wireless Robust Authenticated Protocol)

Key management specific to IEEE and replacement of RC4 by AES

Rely on IETF EAP and Radius standards

Synchronisation and coherence need time

Security issues of 802.11b (Wi-Fi) are solved with this new
generation

Security remains a voluntary choice : it must be configured


Segmentation of Wireless LANs

Segment wireless network with a firewall from corporate network

Enforce access control to the wireless network

Authentication of hosts to access the wireless LAN is done by the
network
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: seminar on lan, ieee 802 11wireless lan full report, download full seminar report of wireless lan, wireless lan security seminar doc, wireless lan security seminar report pdf, wireless lan security seminar report ppt, seminar about wlan,
Popular Searches: seminar report on wireless lan security, seminar report on wireless security, seminar on wireless lan security full report downloads, wireless lan security report, seminar on wireless lan security, seminar wireless lan security, wireless lan security seminar doc,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Wireless LAN Security FULL REPORT - by seminar details - 05-06-2012, 03:11 PM
RE: Wireless LAN Security FULL REPORT - by Guest - 05-11-2014, 11:38 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  ATM WITH AN EYE FULL REPORT seminar details 1 5,808 09-07-2016, 12:36 PM
Last Post: seminar report asees
  Authentication Schemes for Session Passwords using Color and Images full report seminar details 1 2,854 29-07-2015, 02:27 PM
Last Post: Guest
  AUTOMATIC PHASE CHANGER full report seminar paper 3 3,565 27-03-2015, 10:06 AM
Last Post: seminar report asees
  BRAIN FINGERPRINTING full report project uploader 2 10,815 24-10-2014, 11:49 PM
Last Post: jaseela123d
  Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networksy seminar addict 1 1,526 25-08-2014, 05:40 PM
Last Post: Guest
  TERRORISM full report project uploader 2 2,315 08-05-2013, 10:17 AM
Last Post: computer topic
  MEMRISTOR FULL REPORT seminar details 1 3,471 25-01-2013, 12:02 PM
Last Post: seminar details
  Windows 8 FULL REPORT seminar paper 3 4,527 24-01-2013, 12:34 PM
Last Post: seminar details
  FIREWIRE full report seminar details 1 2,460 11-01-2013, 10:18 AM
Last Post: seminar details
  SOLAR POWER TOWER full report seminar details 1 2,358 30-11-2012, 01:39 PM
Last Post: seminar details

Forum Jump: