0% found this document useful (0 votes)
3 views

Module 05 Wireless Network Security

The document provides an overview of wireless network security, highlighting key threats such as eavesdropping and unauthorized access. It discusses security measures in GSM and UMTS, noting their weaknesses, and outlines Bluetooth security features and vulnerabilities. Additionally, it compares wireless encryption protocols, detailing the strengths and weaknesses of WEP, WPA, WPA2, and WPA3.

Uploaded by

signinshreyas
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Module 05 Wireless Network Security

The document provides an overview of wireless network security, highlighting key threats such as eavesdropping and unauthorized access. It discusses security measures in GSM and UMTS, noting their weaknesses, and outlines Bluetooth security features and vulnerabilities. Additionally, it compares wireless encryption protocols, detailing the strengths and weaknesses of WEP, WPA, WPA2, and WPA3.

Uploaded by

signinshreyas
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Module 05 – Wireless

Network Security
Wireless Network SecuritySecurity in GSM; UMTS
Security; Bluetooth Security; WEP; WPA2.
Self-learning Topics :- Study of Wireless Security
Tools
1. Introduction to Wireless Network Security
What is Wireless Security?

Wireless security refers to the measures used to protect wireless networks from
unauthorized access, data breaches, and cyber threats. Unlike wired networks,
wireless networks are more vulnerable to security threats due to their broadcast
nature.
Key Threats in Wireless Security
● Eavesdropping: Interception of wireless signals.
● Man-in-the-Middle (MITM) Attacks: An attacker intercepts and alters
communication.
● Denial-of-Service (DoS) Attacks: Jamming wireless signals to disrupt
communication.
● Unauthorized Access: Attackers gain access to private wireless networks.
● Rogue Access Points: Unauthorized Wi-Fi hotspots used to steal data.
2. Security in GSM (Global System for Mobile Communications)

Overview of GSM Security

GSM is a 2G mobile communication standard that introduced basic security


mechanisms. However, its security measures are considered weak by modern
standards.
Security Features in GSM
Authentication
● Uses a challenge-response mechanism between the mobile device and the
network.
● Authentication is based on a secret key (Ki) stored in the SIM card and the
network.
● The network sends a random number (RAND), and the SIM card computes a
response (SRES) using an A3 algorithm.
Security Features in GSM
Data Confidentiality
● GSM encrypts voice and data using the A5 ciphering algorithm to prevent
eavesdropping.
● Encryption is applied only between the mobile device and the base station,
not end-to-end.
Security Features in GSM
Anonymity
● Instead of sending the real International Mobile Subscriber Identity (IMSI),
GSM uses a temporary identity called TMSI (Temporary Mobile Subscriber
Identity).
GSM Security Weaknesses
● Weak Encryption: A5/1 encryption can be cracked with brute force attacks.
● Lack of Mutual Authentication: The network does not authenticate itself to the
mobile device, making IMSI catchers (fake towers) a risk.
● Limited Integrity Protection: Data can be modified without detection.
3. UMTS Security (3G Security)
Improvements in UMTS Security

UMTS (Universal Mobile Telecommunications System) improves GSM security by


adding stronger encryption and mutual authentication.
Key Security Features in UMTS
Mutual Authentication
● Unlike GSM, UMTS ensures both the network and the user authenticate each
other.
● Uses the Aka (Authentication and Key Agreement) Protocol.

Stronger Encryption
● Uses 128-bit encryption keys instead of GSM’s 64-bit encryption.
● Encryption algorithms: KASUMI (used in UEA1 & UIA1 algorithms).
Key Security Features in UMTS
Integrity Protection
● Protects the integrity of signaling messages between the mobile device and
the network.
● Uses UIA1 and UIA2 algorithms.

Protection Against IMSI Catchers


● UMTS limits the use of IMSI (International Mobile Subscriber Identity) to
prevent identity tracking.
UMTS Security Weaknesses
Still vulnerable to fake base stations, although harder to exploit than GSM.

KASUMI encryption flaws can be exploited with advanced attacks.


4. Bluetooth Security
Bluetooth Security Features
● Bluetooth is a short-range wireless technology used in personal devices. It
has security mechanisms but is vulnerable to attacks.

Pairing and Authentication


● Devices must pair before communication.
● Pairing modes: Just Works, PIN-based, Passkey Entry, Out-of-Band (OOB).
Bluetooth Security
Encryption
● Bluetooth uses E0 stream cipher for encrypting data.
● Newer versions use AES-CCM encryption for better security.

Secure Simple Pairing (SSP)


● Introduced in Bluetooth 2.1 to prevent passive eavesdropping.
Bluetooth Security Threats
Bluejacking: Sending unsolicited messages to a Bluetooth device.

Bluesnarfing: Unauthorized access to data via Bluetooth.

Bluebugging: Gaining full control over a Bluetooth device.

Car Whisperer: Exploiting Bluetooth in cars to intercept conversations.


5. Wireless Encryption Protocols
5.1 Wired Equivalent Privacy (WEP)

WEP was the first wireless security protocol (introduced with IEEE 802.11).

Uses RC4 encryption with 40-bit or 104-bit keys.

Each packet is encrypted with a key + 24-bit Initialization Vector (IV).


Weaknesses of WEP
Short IV (24-bit) allows easy key reuse, making it vulnerable to replay attacks.

RC4 encryption is weak, and WEP keys can be cracked in minutes using tools like
Aircrack-ng.

No key management mechanism, requiring manual key distribution.


5.2 Wi-Fi Protected Access 2 (WPA2)
Introduced as a replacement for WEP, based on IEEE 802.11i standard.

Uses AES (Advanced Encryption Standard) with CCMP (Counter Mode with
Cipher Block Chaining Message Authentication Code Protocol).
Security Features in WPA2
Stronger Encryption
● AES-CCMP provides 128-bit encryption, making it highly secure.

Two Authentication Modes


● WPA2-Personal (WPA2-PSK): Uses a pre-shared key (good for home networks).
● WPA2-Enterprise: Uses RADIUS authentication for corporate networks.

Integrity Protection
● CCMP prevents replay attacks and message tampering.
Weaknesses of WPA2
Vulnerable to brute-force dictionary attacks if weak passwords are used.

KRACK (Key Reinstallation Attack) can exploit weaknesses in WPA2 handshake.


Summary of Wireless Security Protocols
Protocol Encryption Key Length Vulnerabilities

WEP RC4 40/104-bit Easily cracked, IV


collisions, no
integrity check

WPA TKIP 128-bit Weak against


dictionary attacks,
replay attacks

WPA2 AES-CCMP 128-bit Vulnerable to


KRACK attack

WPA3 AES-GCMP 192-bit (Enterprise) More secure but


limited adoption

You might also like