Understanding Wireless Network Security

Aug 9, 2024

Wireless Network Security

Importance of Network Security

  • Sensitive information sent over wireless networks
  • Need to limit access to provide confidentiality
  • User authentication required (username, password, multifactor authentication)
  • Ensures data is sent only to authorized users
  • Encrypts and protects data
  • Message Integrity Check (MIC) ensures proper data transmission

Encryption Protocols

WPA (Wi-Fi Protected Access)

  • Introduced in 2002 as a replacement for WEP (Wired Equivalent Privacy)
  • Uses RC4 encryption cipher and TKIP (Temporal Key Integrity Protocol)
  • Larger Initialization Vector (IV) and encrypted hash communication
  • Each packet has its own encryption key

WPA2

  • Introduced in 2004
  • Uses CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
    • AES for data confidentiality
    • CBC-MAC for Message Integrity Check (MIC)

WPA3

  • Introduced in 2018
  • Uses GCMP (Galois/Counter Mode Protocol)
    • Stronger encryption method
    • AES for data confidentiality
    • GMAC for Message Integrity Check
  • Prevents brute force attacks on hashed passwords
    • Mutual authentication (both client and access point authenticate each other)
    • Creates shared session key without sending it across the network
    • Incorporates perfect forward secrecy (each session uses a separate session key)
    • Uses Simultaneous Authentication of Equals (SAE), also known as "dragonfly handshake"

Security Configurations

Open System

  • No encryption or authentication required
  • Easy to connect

Pre-shared Key (Personal)

  • Common in homes
  • Single shared key for all devices
  • WPA2 or WPA3 PSK (Pre-Shared Key)

Enterprise or Corporate Network

  • Individual usernames and passwords for each user
  • Uses WPA2 or WPA3 Enterprise (802.1X)
  • Authentication servers like Active Directory or RADIUS server