Wireless Security
Wireless Security
This is the situation, where the concept of wireless controller comes into
play. It is the "Mastermind" behind all the wireless network operation. This
centralized server which has the IP connectivity to all the AP's on the
network making it easy to manage all of them globally from the single
management platform, push configuration templates, monitor users from
all the AP's in real time and so on.
Antennas
2.Denial of Service: Sending large amounts of traffic (or viruses) over the
network with the intent of hijacking resources or introducing backdoors.
WLANs transmit data over the air and thus there is an inherent
need to protect data confidentiality. This is best done using
encryption. The WLAN committee (IEEE 802.11) formulated the
following protocols for data encryption:
While WEP provides each authorized system with the same key, WPA
uses the temporal key integrity protocol (TKIP), which dynamically
changes the key that systems use. This prevents intruders from
creating their own encryption key to match the one used by the secure
network. The TKIP encryption standard was later superseded by the
Advanced Encryption Standard (AES).
In addition, WPA included message integrity checks to determine if an
attacker had captured or altered data packets. The keys used by WPA
were 256-bit, a significant increase over the 64 bit and 128-bit keys
used in the WEP system. However, despite these improvements,
elements of WPA came to be exploited – which led to WPA2.
What is WPA2?
Both modes use the CCMP – which stands for Counter Mode Cipher
Block Chaining Message Authentication Code Protocol. The CCMP
protocol is based on the Advanced Encryption Standard (AES)
algorithm, which provides message authenticity and integrity
verification. CCMP is stronger and more reliable than WPA's original
Temporal Key Integrity Protocol (TKIP), making it more difficult for
attackers to spot patterns
However, WPA2 still has drawbacks. For example, it is vulnerable to
key reinstallation attacks (KRACK). KRACK exploits a weakness in
WPA2, which allows attackers to pose as a clone network and force the
victim to connect to a malicious network instead.
What is WPA3?
WPA3 is the third iteration of the Wi-Fi Protected Access protocol. The
Wi-Fi Alliance introduced WPA3 in 2018. WPA3 introduced new
features for both personal and enterprise use, including: