Você está na página 1de 16

Topic :- Wi-Fi Protected Access (WPA and WPA2) is a certification program

developed by the Wi-Fi Alliance to indicate compliance with the security


protocol created by the Wi-Fi Alliance to secure wireless computer networks.

Submitted to:-
Dinesh Sir
Submitted by :-
Name: Yogesh
Gandhi
Roll No: RC2801B48
Section: C2801
Reg No: 10808452
ACKNOWLEDGEMENT

I take this opportunity to present my votes of thanks to all those guidepost who really acted
as lightening pillars to enlighten our way throughout this project that has led to successful
and satisfactory completion of this study.

We are really grateful to our teacher for providing us with an opportunity to undertake this
project in this university and providing us with all the facilities. We are highly thankful to
Mr. Dinesh Sir for her active support, valuable time and advice, whole-hearted guidance,
sincere cooperation and pains-taking involvement during the study and in completing the
assignment of preparing the said project within the time stipulated.

Lastly, We are thankful to all those, particularly the various friends , who have been
instrumental in creating proper, healthy and conductive environment and including new and
fresh innovative ideas for us during the project, their help, it would have been extremely
difficult for us to prepare the project in a time bound framework.

Name-Yogesh Gandhi

Regd.No-10808452

Rollno-RC2801B48
Table of Content

Wi-Fi Protected Access


 First of all what is Wi-Fi?

 What is wireless Networking?

 What is Network security?


 What is WPA?
 What is WPA2?

 Summary

 Reference
Wi-Fi Protected Access intended WPA as an intermediate
measure to take the place of WEP
Wi-Fi Protected Access (WPA pending the preparation of
and WPA2) is a certification 802.11i. Specifically, the
program developed by the Wi-Fi Temporal Key Integrity Protocol
Alliance to indicate compliance (TKIP), was brought into WPA.
with the security protocol created TKIP could be implemented on
by the Wi-Fi Alliance to secure pre-WPA wireless network
wireless computer networks. The interface cards that began shipping
Alliance defined the protocol in as far back as 1999 through
response to several serious firmware upgrades. Because the
weaknesses researchers had found changes required fewer
in the previous system, WEP modifications on the client than on
(Wired Equivalent Privacy). the wireless access points (APs),
most pre-2003 APs could not be
The WPA protocol implements upgraded to support WPA with
the majority of the IEEE 802.11i TKIP. Researchers have since
standard. The Wi-Fi Alliance discovered a flaw in TKIP that
relied on older weaknesses to
retrieve the keystream from short of the Wi-Fi logo does not
packets to use for re-injection and necessarily imply a device is
spoofing. incompatible with Wi-Fi devices.

The later WPA2 certification mark As of 2010 an IEEE 802.11 device


indicates compliance with an is installed in many personal
advanced protocol that computers, video game consoles,
smartphones, printers, and other
implements the full standard. This
peripherals, and virtually all
advanced protocol will not work laptop or palm-sized computers.
with some older network cards.
Products that have successfully What is wireless
completed testing by the Wi-Fi Networking?
Alliance for compliance with the
protocol can bear the WPA Wireless or Wi-Fi technology is
certification mark. another way of connecting your
computer to a network without
using wires. Wireless networks
utilize radio waves and/or
microwaves to maintain
communication channels between
First of all what is Wi-Fi? computers. This gives people the
freedom to connect computers
anywhere in your home or office
Wi-Fi is a trademark of the Wi-Fi
network. Wireless networking
Alliance that manufacturers may
works similarly to how cordless
use to brand certified products that
phones work, through radio
belong to a class of wireless local
signals to transmit data from one
area network (WLAN) devices
point A to point B. A basic
based on the IEEE 802.11
wireless design typically consists
standards. Because of the close
of a wireless router that provides
relationship with its underlying
access to the Internet and/or
standard, the term Wi-Fi is often
network and a system that
used as a synonym for IEEE
connects via a wireless adapter.
802.11 technology.
Home wireless networks typically
The Wi-Fi Alliance, a global
consist of at least one Wireless
association of companies,
Access Point/Router and one or
promotes WLAN technology and
more computers that connect to
certifies products if they conform
the wireless router. The Access
to certain standards of
Point/Router is the device that
interoperability. Not every IEEE
systems connect to for access to
802.11-compliant device is
the internet or to another
submitted for certification to the
computer sharing the signal.
Wi-Fi Alliance, sometimes
because of costs associated with
the certification process. The lack
Where it is Used? or assist clients. Enthusiasts or
authorities who wish to provide
Internet access services or even to promote
business in selected areas
A roof-mounted Wi-Fi antenna sometimes provide free Wi-Fi
access. As of 2008 more than 300
A Wi-Fi enabled device such as a metropolitan-wide Wi-Fi (Muni-
personal computer, video game Fi) projects had started. As of
console, mobile phone, MP3 May 2008 the Czech Republic had
player or personal digital assistant 879 Wi-Fi based Wireless Internet
can connect to the Internet when service providers.
within range of a wireless network
connected to the Internet. The Routers that incorporate a digital
coverage of one or more subscriber line modem or a cable
(interconnected) access points — modem and a Wi-Fi access point,
called a hotspot — can comprise often set up in homes and other
an area as small as a few rooms or premises, can provide Internet-
as large as many square miles. access and internetworking to all
Coverage in the larger area may devices connected (wirelessly or
depend on a group of access by cable) to them. One can also
points with overlapping coverage. connect Wi-Fi devices in ad-hoc
Wi-Fi technology has been used in mode for client-to-client
wireless mesh networks, for connections without a router. Wi-
example, in London. Fi also enables places that would
traditionally not have network
access to connect, for example
bathrooms, kitchens and garden
sheds.

City-wide Wi-Fi

A municipal wireless antenna in


Minneapolis

In the early 2000s, many cities


around the world announced plans
In addition to private use in homes for city-wide Wi-Fi networks.
and offices, Wi-Fi can provide This proved to be much more
public access at Wi-Fi hotspots difficult than their promoters
provided either free-of-charge or initially envisioned with the result
to subscribers to various that most of these projects were
commercial services. either canceled or placed on
Organizations and businesses - indefinite hold.
such as those running airports,
hotels and restaurants - often
provide free-use hotspots to attract
A few were successful, for through a new discovery- and
example in 2005, Sunnyvale, security-methodology.
California became the first city in
the United States to offer city- Future directions
wide free Wi-Fi. (As of 2009 few
of the Municipal Wi-Fi firms have As of 2010 Wi-Fi technology has
entered the field of smart grid spread widely within business and
networks. industrial sites. In business
environments, just like other
environments, increasing the
number of Wi-Fi access-points
provides network redundancy,
support for fast roaming and
increased overall network-
capacity by using more channels
or by defining smaller cells. Wi-Fi
enables wireless voice-
applications (VoWLAN or
Campus-wide Wi-Fi WVOIP). Over the years, Wi-Fi
implementations have moved
Carnegie Mellon University built toward "thin" access-points, with
the first wireless Internet network more of the network intelligence
in the world at their Pittsburgh housed in a centralized network
campus in 1994, long before Wi- appliance, relegating individual
Fi branding originated in 1999. access-points to the role of mere
"dumb" radios. Outdoor
Direct computer-to-computer applications may utilize true mesh
communications topologies. As of 2007 Wi-Fi
installations can provide a secure
Wi-Fi also allows computer networking gateway,
communications directly from one firewall, DHCP server, intrusion
computer to another without the detection system, and other
involvement of an access point. functions.
This is called the ad-hoc mode of
Wi-Fi transmission. This wireless What is Network security?
ad-hoc network mode has proven
popular with multiplayer handheld The main issue with wireless
game consoles, such as the network security is its simplified
Nintendo DS, digital cameras, and access to the network compared to
other consumer electronics traditional wired networks such as
devices. ethernet. With wired networking
one must either gain access to a
Similarly, the Wi-Fi Alliance building (physically connecting
promotes a pending specification into the internal network) or break
called Wi-Fi Direct for file through an external firewall. Most
transfers and media sharing business networks protect
sensitive data and systems by quickly recover WEP encryption
attempting to disallow external keys. Once it has seen 5-10
access. Thus gaining wireless million encrypted packets,
connectivity provides an attack AirSnort can determine the
vector, particularly if the network encryption password in under a
lacks encryption or if the intruder second; newer tools such as
can defeat any encryption. aircrack-ptw can use Klein's attack
to crack a WEP key with a 50%
Attackers who have gained access success rate using only 40,000
to a Wi-Fi network can use DNS packets.
spoofing attacks very effectively
against any other user of the To counteract this in 2002, the
network, because they can see the Wi-Fi Alliance approved Wi-Fi
DNS requests made, and often Protected Access (WPA) which
respond with a spoofed answer uses TKIP as a stopgap solution
before the queried DNS server has for legacy equipment. Though
a chance to reply. more secure than WEP, it has
outlived its designed lifetime, has
Securing methods known attack vectors and is no
longer recommended.
A common but unproductive
measure to deter unauthorized In 2004, the IEEE ratified the full
users involves suppressing the IEEE 802.11i (WPA2) encryption
access point's SSID broadcast, standards. If used with a 802.1X
"hiding" it. This is ineffective as a server or in pre-shared key mode
security method because the SSID with a strong and uncommon
is broadcast in the clear in passphrase WPA2 is still
response to a client SSID query. considered secure, as of 2009.
Another unproductive method is
to only allow computers with
known MAC addresses to join the
network. But intruders can defeat What is WPA?
this method because they can
often (though not always) set Wireless Access Protocol (WAP)
MAC addresses with minimal is an open international standard
effort (MAC spoofing). If for application-layer network
eavesdroppers have the ability to communications in a wireless-
change their MAC address, then communication environment.
they may join the network by Most use of WAP involves
spoofing an authorized address. accessing the mobile web from a
mobile phone or from a PDA.
Wired Equivalent Privacy (WEP)
encryption was designed to protect A WAP browser provides all of
against casual snooping, but is the basic services of a computer-
now deprecated. Tools such as based web browser but simplified
AirSnort or Aircrack-ng can to operate within the restrictions
of a mobile phone, such as its communicated, and by deducing
smaller view screen. Users can and forging the WEP key to gain
connect to WAP sites: websites unauthorized access to network
written in, or dynamically and Internet services. This could
converted to, WML (Wireless be accomplished in a matter of
Markup Language) and accessed hours on a busy, corporate
via the WAP browser. WLAN. Also, WEP lacks a means
of authentication, validating user
Before the introduction of WAP, credentials to ensure that only
service providers had extremely those who should be on the
limited opportunities to offer network are allowed to access it.
interactive data services, but WPA addresses these flaws and
needed interactivity to support brings additional safeguards to
now-commonplace activities such Wi-Fi security. WPA uses a
as: greatly enhanced encryption
scheme, Temporal Key Integrity
• Email by mobile phone Protocol (TKIP). Together with
• Tracking of stock-market 802.1X/EAP authentication, TKIP
prices employs a key hierarchy that
• Sports results greatly enhances protection. It
• News headlines also adds a Message Integrity
• Music downloads Check (MIC, sometimes called
“Michael”) to protect against
The Japanese i-mode system packet forgeries.
offers another major competing
wireless data protocol.

SECURITY MECHANISMS IN Technical specifications


WPA
One of WEP’s chief weaknesses OSI MODEL
was that it used a small static key
to initiate encryption. This 40-bit 7 Application Layer
key is entered manually on the AP 6 Presentation Layer
and on all clients that 5 Session Layer
communicate with the AP. It does 4 Transport Layer
not change unless it is manually
3 Network Layer
re-entered on all devices, a
daunting labor-intensive task in a Data Link Layer
large organization. Cryptographic
studies have demonstrated that an 2 • LLC sublayer
intruder who collects enough data
can threaten a WEP network in • MAC sublayer
three ways: by intercepting and 1 Physical Layer
decrypting the data that is being • The WAP standard
transmitted over the air, by describes a protocol suite
altering the data that is that allows the
interoperability of WAP
equipment and software upper layers by providing
with many different unreliable transport of data
network technologies, thus with two 16-bit port
allowing the building of a numbers (origin and
single platform for destination). All the upper
competing network layers view WDP as one
technologies such as GSM and the same protocol,
and IS-95 (also known as which has several
CDMA) networks. "technical realizations" on
top of other "data bearers"
such as SMS, USSD, etc.
On native IP bearers such
+--------------------------------------- as GPRS, UMTS packet-
---+ radio service, or PPP on
| Wireless Application top of a circuit-switched
Environment (WAE) | data connection, WDP is
+--------------------------------------- in fact exactly UDP.
---+ \
| Wireless Session Protocol • WTLS, an optional layer,
(WSP) | | provides a public-key
+--------------------------------------- cryptography-based
---+ | security mechanism
| Wireless Transaction Protocol similar to TLS.
(WTP) | | WAP
+--------------------------------------- • WTP provides transaction
---+ | protocol support (reliable
| Wireless Transport Layer request/response) adapted
Security (WTLS) | | suite to the wireless world.
+--------------------------------------- WTP supports more
---+ | effectively than TCP the
| Wireless Datagram Protocol problem of packet loss,
(WDP) | | which occurs commonly in
+--------------------------------------- 2G wireless technologies
---+ / in most radio conditions,
| *** Any Wireless Data but is misinterpreted by
Network *** | TCP as network
+--------------------------------------- congestion.
---+
• Finally, one can think of
• The bottom-most protocol WSP initially as a
in the suite, the WAP compressed version of
Datagram Protocol HTTP.
(WDP), functions as an
adaptation layer that This protocol suite allows a
makes every data network terminal to transmit requests that
look a bit like UDP to the have an HTTP or HTTPS
equivalent to a WAP gateway; the June 2000. The most important
gateway translates requests into addition in version 1.2 was WAP
plain HTTP. push.

Wireless Application WAP Push Process


Environment (WAE)
WAP Push has been incorporated
The WAE space defines into the specification to allow
application-specific markup WAP content to be pushed to the
languages. mobile handset with minimum
user intervention. A WAP Push is
For WAP version 1.X, the primary basically a specially encoded
language of the WAE is WML, message which includes a link to a
which has been designed by WAP address.
Santhosh Kumar from scratch for
hand-held devices with phone- WAP Push is specified on top of
specific features. In WAP 2.0, the WDP; as such, it can be delivered
primary markup language is over any WDP-supported bearer,
XHTML Mobile Profile. such as GPRS or SMS. Most
GSM networks have a wide range
History of modified processors, but GPRS
activation from the network is not
The WAP Forum dates from 1997. generally supported, so WAP
It aimed primarily to bring Push messages have to be
together the various wireless delivered on top of the SMS
technologies in a standardised bearer.
protocol.[

In 2002 the WAP Forum was


consolidated (along with many
other forums of the industry) into
OMA (Open Mobile Alliance),
which covers virtually everything
in future development of wireless
data services.

WAP 1.X
On receiving a WAP Push, a
The WAP 1.0 standard, released
WAP 1.2 or later enabled handset
in April 1998, described a
will automatically give the user
complete software stack for
the option to access the WAP
mobile internet access.
content. This is also known as
WAP Push SI (Service
WAP version 1.1 came out in
Indication).
1999. WAP 1.2, the final update
of the 1.X series was released in
The network entity that processes authentication server.Each
WAP Pushes and delivers them wireless network device encrypts
over an IP or SMS Bearer is the network traffic using a 256 bit
known as a Push Proxy Gateway key. This key may be entered
(PPG). either as a string of 64
hexadecimal digits, or as a
WAP 2.0 passphrase of 8 to 63 printable
ASCII characters. If ASCII
WAP 2.0, released in 2002, a re- characters are used, the 256 bit
engineered WAP, uses a cut-down key is calculated by applying the
version of XHTML with end-to- PBKDF2 key derivation function
end HTTP (i.e., dropping the to the passphrase, using the SSID
gateway and custom protocol suite as the salt and 4096 iterations of
used to communicate with it). A HMAC-SHA1.
WAP gateway can be used in
conjunction with WAP 2.0; Shared-key WPA remains
however, in this scenario, it is vulnerable to password cracking
used as a standard proxy server. attacks if users rely on a weak
The WAP gateway's role would passphrase. To protect against a
then shift from one of translation brute force attack, a truly random
to adding additional information passphrase of 13 characters
to each request. This would be (selected from the set of 95
configured by the operator and permitted characters) is probably
could include telephone numbers, sufficient. Lookup tables have
location, billing information, and been computed by the Church of
handset information. WiFi (a wireless security research
group) for the top 1000 SSIDs for
Mobile devices process XHTML a million different WPA/WPA2
Mobile Profile (XHTML MP), the passphrases. To further protect
markup language defined in WAP against intrusion the network's
2.0. It is a subset of XHTML and SSID should not match any entry
a superset of XHTML Basic. A in the top 1000 SSIDs.
version of cascading style sheets
(CSS) called WAP CSS is In November 2008 Erik Tews and
supported by XHTML MP Martin Beck - reseachers at two
German technical universities (TU
• Dresden and TU Darmstadt) -
uncovered a WPA weaknesswhich
security in pre-shared relied on a previously known flaw
key mode in WEP that could be exploited
only for the TKIP algorithm in
Pre-shared key mode (PSK, also WPA. The flaw can only decrypt
known as Personal mode) is short packets with mostly known
designed for home and small contents, such as ARP messages,
office networks that don't require and 802.11e, which allows Quality
the complexity of an 802.1X of Service packet prioritization as
defined. The flaw does not lead to Additionally, WPA2 will provide
key recovery, but only a a new, encryption scheme, the
keystream that encrypted a Advanced Encryption Standard
particular packet, and which can (AES). AES has already been
be reused as many as seven times adopted as an official government
to inject arbitrary data of the same standard by the U.S. Department
packet length to a wireless client. of Commerce and the National
For example, this allows someone Institute of Standards and
to inject faked ARP packets which Technology (NIST). AES will be
makes the victim send packets to defined in counter cipher-block
the open Internet. This attack was chaining mode (CCM) and will
further optimised by two Japanese support the Independent Basic
computer scientists Toshihiro Service Set (IBSS) to enable
Ohigashi and Masakatu Morii. security between client
They developed a way to break workstations operating in ad hoc
the stopgap WPA system that uses mode. AES uses a mathematical
the Temporal Key Integrity ciphering algorithm
Protocol (TKIP) algorithm, that employs variable key sizes of
whereas WPA2 systems that use 128-, 192- or 256-bits.
the stronger CCMP algorithm are Like WPA, WPA2 will use the
not affected. In October 2009, 802.1X/EAP framework as part of
Halvorsen with others made a the infrastructure that ensures
further progress, enabling centralized mutual authentication
attackers to inject larger malicious and dynamic key management. It,
packets (596 bytes, to be more too, offers a pre-shared key for
specific) within approximately 18 use in home and small office
minutes and 25 seconds. environments. Like WPA, WPA2
is designed to secure all versions
WPA2 of 802.11 devices, including
WPA2 has replaced WPA; WPA2 802.11b, 802.11a, and 802.11g,
requires testing and certification multi-band and multi-mode.
by the Wi-Fi Alliance. WPA2 Enterprises building new WLANs
implements the mandatory will find AES attractive. However,
elements of 802.11i. In particular, in many cases it will require new
it introduces a new AES-based investments in hardware. Thus,
algorithm, CCMP, which is the business must weigh the
considered fully secure. benefits of the enhanced security
Certification began in September, that WPA2 offers against the cost
2004; from March 13, 2006, of new equipment. There is no
WPA2 certification is mandatory reason not to upgrade now to
for all new devices to bear the Wi- WPA. While a hardware upgrade
Fi trademark. TKIP encryption, may be needed to deploy the AES
802.1X/EAP authentication and portion of WPA2 on WPA-
PSK technology in WPA are enabled devices, the 802.1X
features that have been brought authentication, TKIP encryption,
forward from WPA2. and PSK components of Wi-Fi
Protected Access make the two produced prior to the introduction
specifications quite compatible. of the protocol which usually had
WPA2 offers a graceful transition only supported inadequate
path from WPA that presents a security through WEP. Many of
compelling case for upgrading to these devices support the security
WPA now. WPA2 will offer a protocol after a firmware upgrade.
highly secure “mixed mode” that Firmware upgrades are not
supports both WPA and WPA2 available for all legacy devices.
client workstations. This will
allow for an orderly transition in Furthermore, many consumer Wi-
large enterprises that cannot Fi device manufacturers have
readily upgrade in a short period taken steps to eliminate the
of time. potential of weak passphrase
Unlike the WEP/WPA mixed choices by promoting an
mode in WPA devices, WPA2’s alternative method of
mixed mode will support both automatically generating and
WPA and WPA2. It delivers a distributing strong keys when
high level of security to users add a new wireless adapter
enterprises as they make the move or appliance to a network. The
to the even higher level of security Wi-Fi Alliance has standardized
offered in WPA2. Since Wi-Fi these methods and certifies
Protected Access already provides compliance with these standards
strong encryption, the transition to through a program called Wi-Fi
WPA2 clients and APs can be Protected Setup.
done gradually, seamlessly, and
with a high level of confidence
that security will not be
compromised. EAP extensions under
WPA- and WPA2-
Enterprise
Hardware support
The Wi-Fi alliance has announced
the inclusion of additional EAP
Most newer certified Wi-Fi (Extensible Authentication
devices support the security Protocol) types to its certification
protocols discussed above, out-of- programs for WPA- and WPA2-
the-box: compliance with this Enterprise certification programs.
protocol has been required for a This was to ensure that WPA-
Wi-Fi certification since Enterprise certified products can
September 2003. interoperate with one another.
Previously, only EAP-TLS
The protocol certified through Wi- (Transport Layer Security) was
Fi Alliance's WPA program (and certified by the Wi-Fi alliance.
to a lesser extent WPA2) was
specifically designed to also work
with wireless hardware that was
As of 2010 the certification authentication, while in the
program includes the following Enterprise mode of operation,
EAP types: authentication is achieved via
802.1X and the EAP. Personal
• EAP-TLS (previously mode requires only an access
tested) point and client device, while
• EAP-TTLS/MSCHAPv2 Enterprise mode typically requires
• PEAPv0/EAP- a RADIUS or other authentication
MSCHAPv2 server on the network.
• PEAPv1/EAP-GTC WPA2™ provides improved
• PEAP-TLS encryption with AES and a high
• EAP-SIM level of assurance that only
authorized users can access the
802.1X clients and servers network WPA2 able to meet
developed by specific firms may government and enterprise
support other EAP types. This security requirements WPA™ is
certification is an attempt for still a very secure solution First
popular EAP types to interoperate; WPA2 products announced on
their failure to do so is currently September 1st WMM™ enables a
one of the major issues preventing new class of consumer electronics
rollout of 802.1X on products based on Wi-Fi® WMM
heterogeneous networks. provides users with enhanced
multimedia Capabilities based
upon IEEE 802.11e standard First
WMM products to be announced
Summary in September.

Both WPA and WPA2 offer a WPA and WPA2 difference


high level of assurance for end- WPA2 provides a stronger
users and network administrators encryption mechanism through
that their data will remain private Advanced Encryption Standard
and access to their network (AES), which is a requirement for
restricted to authorized users. some corporate and government
Both utilize 802.1X and users.
Extensible Authentication
Protocol (EAP) for authentication.
Both have Personal and Enterprise
References
modes of operation that meet the
distinct needs of the two different • http://en.wikipedia.or
consumer and enterprise market g/wiki/Wi-
segments. Fi_Protected_Access
Like WPA, WPA2 offers both a
Personal and Enterprise mode of
operation. In the Personal mode of
• http://www.wirelessfo
operation, a pre-shared key rums.org/alt-internet-
(password) is used for
wireless/wap2-same-
wap-psk-27777.html

• http://www.howstuff
works.com/wireless-
network.htm

• www.wi-fiplanet.com

Você também pode gostar