Professional Documents
Culture Documents
Network
Er. Avinash Bhagat
UID11002
Assistant Professor
School of Computer Applications
Lovely Professional University
avinash.bhagat@lpu.co.in
avinash.bhagat@gmail.com
9463281930
Wireless Networks
Security issues
Chapter 14
Network security
requirement
Confidentiality-only to the intended receiver
(Data privacy) information is never released to
unauthorized users
Network security
requirement
Availability: remain operational all the times
Authentication : concerned
with verifying
Network security
Non-repudiation :
requirement
sender of the message cant later deny having sent the
message the recipient cannot deny having received
the message.
ensure that a message was originally sent by the
sender and it was verified that the message was
received by the recipient.
Security Issues
SECURITY ISSUES
LAYER
Application
Layer
Transport
layer
10
Security Threats
Four types of security threats:
Interception
Interruption
Modifications
Fabrication
11
Security Threats
Four types of security threats:
Interception refers to the situation that
an unauthorized party has gained access
to a service or data.
Interruption refers to the situation in
which
services
or
data
become
unavailable, unusable, or destroyed.
12
Security Threats
Four types of security threats:
Modifications
involve
unauthorized
changing of data or tampering with a
service.
Fabrication refers to the situation in
which additional data or activity are
generated that would normally not exist.
13
Passive Attacks
Active Attacks
Snooping
MAC Layer
Attacks
Jamming
Network Layer
Attacks
Transport Layer
Attacks
Application Layer
Attacks
Session
hijacking
Repudiation
Wormhole
attack
Blackhole attack
Byzantine attack
Information disclosure
Resource consumption attack
Other attacks
DoS
Impersonation
Manipulation
of network
traffic
Device
tampering
Routing attacks
14
15
16
17
18
19
20
21
22
23
24
27
28
29
30
Other Attacks
31
Denial of service:
An adversary attempts to prevent
authorized users from accessing
the service.
Jamming: Transmitting signals on
the frequency of senders and
receivers
to
hinder
the
communication.
32
Denial of service:
SYN flooding: An adversary node
send a large number of SYN
packets to a victim node.
Distributed DoS attack: Several
adversaries attack a service at the same
time.
33
Other Attacks
Impersonation
An adversary assumes the identity and privileges of an
authorized node to
Make use of network resources that may not be
available to it under normal circumstances.
Disrupt functioning of network by inserting false
routing information on the network
Can get by chance or by guess the authentication of
authorized nodes.
Man in the middle attack
34
Other Attacks
Device Tempering
35
Question Bank
1.Explain network security requirements.
2.What are issues and challenges in
security provisioning?
3.What are various network layer attacks
4.What are various routing attacks
5.What is session hijacking?
6.What is repudiation attack in wireless
networks
36
Question Bank
7.Explain various multilayer attacks in
wireless networks.
8.How DoS attack is preformed by
adversaries in wireless networks?
9.What are various Impersonation attacks
in wireless networks ?
37