You are on page 1of 11

Wi-Fi security

CANADIAN INSTITUTE OF TECHNOLOGY (CIT)


S O F T WA R E E N G I N E E R I N G
S T U D E N T: V I S E L D A B E Q I R A J
Agenda:
1. What Is Wi-Fi and how we get it
2. Types of wireless security protocols
3. Wireless security threats and risks
4. Ways to protect a Wi-Fi network
5. Code for AES encryption/decryption
6. Conclusion
Wi-Fi definition
Wi-Fi transmits data using microwaves, which are high-energy radio waves.
Encode information into radio waves, which are received and decoded.
Radio waves emanate outwards from the antenna and are received by your wireless router. That
wireless router then converts the radio waves back into data and then sends that data to the
Internet using a physical connection.
Types of wireless security protocols
WEP - (Wired Equivalent Privacy). It was the standard method of providing wireless network
security. WEP was hard to configure, and it used only basic (64-/128-bit) encryption. (WEP is no
longer considered secure and should be replaced by a newer protocol such as WPA2.

WPA- (Wi-Fi Protected Access) delivers stronger (128-/256-bit) encryption than WEP by using a
security protocol known as Temporal Key Integrity Protocol (TKIP). Along with WPA2, WPA is the
most common protocol in use today. But unlike WPA2, it is compatible with older software.
Types of wireless security protocols
WPA2 - a later version of WPA, was developed in 2004. It's easier to configure
and provides even greater network security than WPA by using a security
protocol known as the Advanced Encryption Standard (AES).
WPA3 - A new generation of WPA, known as WPA3, is designed to deliver
simpler configuration and even stronger (192-/256-/384-bit) encryption and
security than any of its predecessors. It is also meant to work across the latest
Wi-Fi 6 networks.
Wireless security threats and risks
IP spoofing - Attackers penetrate wireless networks by
impersonating trusted IP addresses. This may allow
attackers to plant malware, initiate distributed-denial-
of-service (DDoS) attacks, or carry out other nefarious
acts.
DNS-cache poisoning - hacking a network and
diverting network traffic to an attacker's computer or
server or to another out-of-network device.
Man in the middle – attacker positions himself in a
conversation between a user and an application—
either to eavesdrop or to impersonate one of the
parties, making it appear as if a normal exchange of
information is underway.
  Ways to protect a Wi-Fi network
Encryption - Encryption in digital communications encodes data and then
decodes it only for authorized recipients.
Virtual private networks (VPNs) - They allow users to create secure, identity-
protected tunnels between unprotected Wi-Fi networks and the internet.
Media Access Control (MAC) addresses
Security software - There are many types of consumer and enterprise software
that also can provide Wi-Fi security. Some Wi-Fi protection software is bundled
with related products, such as antivirus software.
Code for AES encryption and
decryption
It uses a substitution-permutation, or SP network,
with multiple rounds to produce ciphertext. The
number of rounds depends on the key size being used.
A 128-bit key size dictates ten rounds, a 192-bit key
size dictates 12 rounds, and a 256-bit key size has 14
rounds.
Each of these rounds requires a round key, but since
only one key is inputted into the algorithm, this key
needs to be expanded to get keys for each round,
including round 0.
Round 1 and 2
Substitution of the bytes -In the first step, the bytes of the block text are substituted based on
rules dictated by predefined S-boxes (short for substitution boxes)
Shifting the rows - Next comes the permutation step. In this step, all rows except the first are
shifted by one
Round 3 and 4
Mixing the columns - In the third step, the Hill cipher is used to jumble up the message more by
mixing the block’s columns.
Adding the round key -In the final step, the message is XORed with the respective round
Conclusion
Wi-Fi security is the protection of devices and networks connected in a wireless environment.
Wireless Security Protocols such as (WEP) and (WPA) are used to ensure wireless security.
Wireless networks may be threatened by many attacks like IP spoofing, Man in the Middle, Dns
cache poisoning etc.
We can protect our wireless network using methods like encryption, VPN, Security software and
MAC addresses in network devices.
The code or simulation describes a design of effective security for data communication by
implementing the AES (Advanced Encryption Standard) algorithm for encryption and decryption.

You might also like