Wireless LAN security (Term 3)
When wireless LANs are widely deployed and we know a lot about its benefits, it is also very difficult to go with it. This article only mentioned and discussed some basic techniques for security h
Wireless LAN security (Term 1)
Wireless LAN security (Term 2)
6. Encryption
Encryption is a data transformation so that only confirmed components can decode it. The encoding process is to combine several plaintext with a key to form a secret text (Ciphertext). The decoding by combining the Ciphertext with the key to reconstruct the original plaintext is shown in Figure 5. The process of arranging and distributing keys is called key management.
Encryption and decoding process
If the same key is used for both encoding and decoding, then the keys are interpreted as 'symmetric'. If different keys are used, this process is interpreted as 'asymmetrric'. Asymmetric keys are widely used in PKIs (Public Key Infrastructures), where a key is 'public' and the rest are 'private'.
There are two encryption methods : Cipher block and Cipher string. Block cipher works on plaintext in bit groups called blocks, typically 64 or 128 bits long. Typical examples of block Cipher such as: DES, triple DES (3DES), AES and Blowfish. Chain Cipher transforms a key into a random 'keystream' (typically 8 bits), then combines with the plaintext to encrypt it. Chain Cipher is used more than block Cipher. Examples of string cipher are: RC4 (used in 802.11 wireless LANs).
7. Confirm wireless
Confirmation is the provision or cancellation of a confirmation by someone or something. Normal validation is a one-way process, such as a log on user with a computer and provides their identity with the username and password. In wireless networks, mutual authentication should be used where the network authenticates the Client and the Client to authenticate the network. This prevents fake devices from disguising themselves as network devices to access important data on wireless clients.
The 802.11 wireless LAN standard does not have intelligent validation, so the industry standard has adopted 802.1x protocol for its validation. 802.1x offers a way to control port-based network access, which uses EAP (Extensible Authentication Protocol) and RADIUS server. 802.1x does not provide a specific validation protocol but specifies EAP in supporting the number of authentication protocols such as CHAP-MD5, TLS and Kerberos. EAP can be extended so new authentication protocols can be supported as in later versions. EAP is provided to operate on Point-to-Point (PPP) protocol; It is compatible with other data link layer protocols (such as Token Ring 802.5 or Wireless LANs 802.11) EAP Over LANs (EAPOL) has been developed. The final confirmation model is shown in the figure below:
Confirmation model
802.1x EAP-TLS is used in high security and native field models. Exchange of EAP-TLS messages provides mutual validation, handshake of the encryption protocol and the exchange of security keys between a wireless client and the network. EAP-TLS is a technique that provides dynamic encryption keys for users and sessions. This greatly improves and overcomes many weaknesses in wireless networks.
The following figure shows a sequence of events that occur when a Client is authenticated by EAP-TLS 802.1x. Two digital certificates are required here: one on RADIUS server (eg EAS) and one on the Wireless Client. Note that wireless access is provided until the successful validation and dynamic WEP keys have been set.
Confirm EAP-TLS 802.1x
802.1x EAP-TLS with EAS in Controller Mode is shown in Figure 8. Wireless client with digital certificate (pre-installed). Wireless client communicates with EAS via AP. All three components (Wireless client, AP and EAS) support the EAP-TLS 802.1x process. Wireless clients can use Windows XP (built to support 802.1x EAP-TLS) or Windows 98 / Me / 2000 using Madge Wireless LAN Utility (WLU). When verified, user data can also be used for EAS that has been configured in Gateway Mode.
802.1x EAP-TLS in Controller Mode
Pham Van Linh
Email: vanlinh@quantrimang.com
You should read it
- The difference between Wireless and True Wireless headphones
- What is wireless charging? Is it faster or slower than charging?
- 7 best 802.11g wireless broadband routers
- 8 popular wireless technology standards today
- What is wireless HDMI? Should I use it?
- New generation wireless initiatives
- What is Qi2 wireless charging? How is it better than Qi?
- Learn about Wireless Sensor Network (WSN)
- How to Use Wireless Headphones
- World wireless technology
- Basic guide: wireless network - Wireless
- The best true wireless headphones on the market - when convenience comes to the throne
Maybe you are interested
What is TPU (Tensor Processing Unit) and how is it used? Fossil launches a hybrid 'smart' smartwatch model that is worth experiencing Common computer errors and remedies (Part 1) Common computer errors and remedies (Part 2) How to 'splash' out of a sudden application on iOS 10? Common errors on Windows 8 CP