In: Computer Science
This research report is broken into two parts:
2. Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and determine which security model it uses. Next, outline the steps it would take to move it to the next highest level. Estimate how much it would cost and how much time it would take to increase the level. Finally, estimate how long it would take you to replace all the data on your computer if it was corrupted by an attacker, and what you might lose. Would this be motivation to increase your current wireless security model? Write a one-page paper on your work.
1) Different EAP protocols that are supported in WPA2 Enterprise:
EAP-TTLS shines over PEAP authentication is that the username is not revealed in clear-text, which might avoid some DoS (Denial of Service) attacks where someone can maliciously log-in repeatedly with the right username and wrong password to lock out that user's account. PEAP authentication only protects the password portion with a strong TLS tunnel but broadcasts the username in the clear.
PEAPv0/EAP-MSCHAPv2 . The server side implementation of PEAPv0/EAP-MSCHAPv2, called IAS (Internet Authentication Service). PEAPv0/EAP-MSCHAPv2 enjoys universal support and is known as the PEAP standard.PEAP is so successful in the market.PEAPv0/EAP-MSCHAPv2 refer to the outer authentication method and is the mechanism that creates the secure TLS tunnel to protect subsequent authentication transactions.EAP-MSCHAPv2 refer to the inner authentication method which facilitates user or device authentication
PEAPv1/EAP-GTC was created as an alternative to PEAPv0/EAP-MSCHAPv2. It allows the use of an inner authentication protocol . PEAPv1 authentication is rarely used. There is no native OS support for this EAP protocol.PEAPv1/EAP-GTC refer to the outer authentication method and is the mechanism that creates the secure TLS tunnel to protect subsequent authentication transactions.EAP-GTC refer to the inner authentication method which facilitates user or device authentication
. PEAP-EAP-TLS does require a client-side digital certificate located on the client's hard drive or a more secure smartcard. PEAP-EAP-TLS is very similar in operation to the original EAP-TLS but provides slightly more protection due to the fact that portions of the client certificate that are unencrypted in EAP-TLS are encrypted in PEAP-EAP-TLS. PEAPv0/EAP-MSCHAPv2 is the only form of PEAP that most people will ever know.
EAP-SIM was created for the GSM mobile telecom industry, which favors the use of SIM cards for authentication. There is no native OS support for this EAP protocol.EAP-SIM refer to the inner authentication method which facilitates user or device authentication
The bottom line is that the current WPA2 standard is now fully mature and provides rock solid wireless LAN security. WPA2 provides solid military grade encryption and a broad choice of strong to strongest authentication protocols. EAP-TLS and PEAPv0/EAP-MSCHAPv2 with universal platform support are the de facto EAP standards in wireless LAN authentication. PEAPv0/EAP-MSCHAPv2 provides strong single-factor security while EAP-TLS provides the strongest two-factor authentication scheme in wireless LAN security.
How to secure your home wireless network