Coconote
AI notes
AI voice & video notes
Export note
Try for free
Understanding Wireless Network Security
Aug 9, 2024
Wireless Network Security
Importance of Network Security
Sensitive information sent over wireless networks
Need to limit access to provide confidentiality
User authentication required (username, password, multifactor authentication)
Ensures data is sent only to authorized users
Encrypts and protects data
Message Integrity Check (MIC) ensures proper data transmission
Encryption Protocols
WPA (Wi-Fi Protected Access)
Introduced in 2002 as a replacement for WEP (Wired Equivalent Privacy)
Uses RC4 encryption cipher and TKIP (Temporal Key Integrity Protocol)
Larger Initialization Vector (IV) and encrypted hash communication
Each packet has its own encryption key
WPA2
Introduced in 2004
Uses CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
AES for data confidentiality
CBC-MAC for Message Integrity Check (MIC)
WPA3
Introduced in 2018
Uses GCMP (Galois/Counter Mode Protocol)
Stronger encryption method
AES for data confidentiality
GMAC for Message Integrity Check
Prevents brute force attacks on hashed passwords
Mutual authentication (both client and access point authenticate each other)
Creates shared session key without sending it across the network
Incorporates perfect forward secrecy (each session uses a separate session key)
Uses Simultaneous Authentication of Equals (SAE), also known as "dragonfly handshake"
Security Configurations
Open System
No encryption or authentication required
Easy to connect
Pre-shared Key (Personal)
Common in homes
Single shared key for all devices
WPA2 or WPA3 PSK (Pre-Shared Key)
Enterprise or Corporate Network
Individual usernames and passwords for each user
Uses WPA2 or WPA3 Enterprise (802.1X)
Authentication servers like Active Directory or RADIUS server
📄
Full transcript