TNC 2003 Wireless Campus project

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WLAN vs. 2G/3G Performance, roaming, mobility, security...
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
TNC 2003 Wireless Campus project Coletta Elisa Marchioro -
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Implementation and Evaluation of a Performance Enhancing Proxy for Wireless TCP Scenarios and Architecture.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
Large Enterprise with Multiple Locations Source: Avaya.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
 ====!"§==Systems= IPonAir T-Systems Nova Content Project goals Reference architecture Reference scenarios Terminology and definition Design principles.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
1 Integrating 3G and WLAN Services in NTP SIP-based VoIP Platform Dr. Quincy Wu National Telecommunications Program Office
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Goodbye! ….. to all things that are connected by cable…… NOW it can be connected using….
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Doc.: IEEE /462r0 IEEE / San Francisco / July 2003 July 2003 Jean-Michel Lauriol, AlcatelSlide 1 TIA TR-41 VoIP over WLAN projects.
KT's IPv6 status and trial service Future Technology Lab Dongjin Kwak, Jaehwa Lee Meeting 2008 at NZ.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
WLAN-GPRS INTEGRATION FOR NEXT-GENERATION MOBILE DATA NETWORKS 通訊工程所 蔡名岳
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
October 4-7, 2004 Los Angeles, CA VoWLAN Trends and Opportunities Kamal Anand Vice President Marketing Meru Networks
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Components of wireless LAN & Its connection to the Internet
Lecture 24 Wireless Network Security
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
January 2003 Richard Paine, Boeing Slide 1 doc.: IEEE /087r0 Submission Slide 1 Richard Paine, Boeing Voice Over IP Scenario For IEEE k.
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Page 1TTT - May 12, GPP IMS Standardization Update Bell Labs Innovations Lucent Technologies Room 9C Lucent Ln. Naperville, IL E Mail.
KFUPM Wireless LAN Sadiq M. Sait. Contents  Introduction  Technology - Brief overview  Project Plan RFP and Start dates Progress Curve  Coverage and.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Networks Unit 5 Digital Literacy Computer Technology (S3 Obj 2-1, 2-2 & 2-3)
COMPUTER FUNDAMENTALS David Samuel Bhatti
IEEE Wireless LAN Standard
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Wireless Access Point Product Overview
Wireless Access Point Product Overview
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Wireless Campus project
Presentation transcript:

TNC 2003 Wireless Campus project

[ 2 Content… ]  CSP profile  Wireless Campus network  User mobility  Security  Further activities

[ 3 Content… ]  CSP profile  Wireless Campus network  User mobility  Security  Further activities

[ 4 Information-and-Communication-Technology Research Centre non-profit consortium recognized by the Italian Ministry of Education, University and Scientific Research ] CSP in brief

[ 5 CSP runs research and professional consultancy through permanent laboratories with the Turin Polytechnic and University of Turin –INLab (Integrated Networks Laboratory) 360° view on ICT solutions – Multimedia protocols (H323, SIP, streaming), networking (IPv6, BGP), and wireless technology as points of strength –SecureLab studies on ICT security aspects – application, network, system, and mobile security –WTLab (Web Technology Laboratory) studies on development and access to telematic applications (standards, tools, new technologies) ] CSP in brief

[ 6 Technology focus –IP-Based Technology Networks –IPv6 –Gigabit Networking –IP Telephony (H.323, SIP) –Wireless LAN –Satellite (DVB, DVB-RCS, MHP) –Digital security –Opensource ] CSP in brief

[ 7 Content… ]  CSP profile  Wireless Campus network  User mobility  Security  Further activities

[ 8 Objectives –Conjugate CSP R&D activities on WLANs with dissemination of competency –Promote the adoption of the wireless technologies among local communities and enterprises (SMEs, PA) ] Wireless Campus

[ 9 The mean idea is realizing a WLAN network as –Real test-bed for research activities on WLAN technologies –Experimental field for end-user services to prototype after R&D results Key issues –State-of-the-art technology –Multiple service scenarios ] Wireless Campus

[ 10 The Wireless Campus project has been supported by Environment Park: Turin technology park that combine technological innovation and eco- efficiency, hosting several companies and Research Institutes operating both in the Environmental Protection field and the ICT field ] Location

[ 11 The park provides a ideal location for the project for –Many SMEs and LABs are hosted –Offers wide band connection to ISPs –Provides private and public areas (conference centre) in a mixed environment –Promotes projects that could fit well for integration with wireless technologies (e.g. domotic LAB) ] Location

[ 12 Technology is b (and Wi-Fi) compliant Architecture includes –Access points + centralized management server for network infrastructure –Security servers –Add-on services devices (e.g. , multimedia, ecc.) Two phases for network deployment –Phase 1 First network core of 16 access points, management server, security servers and base services activation –Phase 2 Advanced service activation and coverage extension planning according to Phase1 results The network ]

[ 13 Phase 1 – network deployment ] RF coverage RF signal

[ 14 EM measurements –Identify EM permeability of building materials and structures at 2.4 GHz – useful for future deployments on building project phase –Simulation of EM field propagation indoor and outdoor based on previous measured values –Verification with possible RF interference sources (e.g. Bluetooth transmitters, other APs, ecc.) ] Site survey

[ 15 Phase 1 –All access point on the same LAN –Static IP addresses –Service provided for internal users only –Equipment (laptop, PDA) Phase 2 –Access point on different LANs –DHCP server to provide terminals public IP addresses –Service provided to visitors –Rentable client equipment The network ]

[ 16 CSP Enviroment Park SMEsLABs External networks (other hot-spots) WLAN access network WLAN management Security Shared services Intranet services Service centre Telco network Wireless Campus extensions Network architecture ]

[ 17 Basic (active) – –Web navigation – redirection to specific web pages to promote initiatives and locate offices in the park –Intranet access Advanced (to provide later) –Video-surveillance from wireless webcams –Instant messaging –Presence services –Streaming (radio, video) ] Services

[ 18 A single network infrastructure providing –Dedicated network access for some entities –Shared environment in common places Services –Targeted to different types of terminals (PDA, laptop, PC) –Tailored on the user privileges (web access, intranet resources availability) ] Issues

[ 19 Main points: –User mobility –Security –QoS –Interoperability ] Challenges

[ 20 Content… ]  CSP profile  Wireless Campus network  User mobility  Security  Further activities

[ 21 From network perspective –Phase 1 mobility among AP on the same WLAN  seamless handover –Phase 2 mobility among different WLAN  planning to deploy Mobile IPv4 on some areas  LAB activity on Mobile IPv6 From service perspective –Studies about user localization on WLAN –Location Based Services ] Mobility

[ 22 Plan to connect Wireless Campus hot-spot with GPRS Cellular operator network –Testing of WLAN-GPRS roaming features At present –802.11b client cards provided with SIM slot for GPRS connectivity –Users can connect through WLAN under Wireless Campus hot-spot coverage and through GPRS when away ] WLAN + GPRS

[ 23 CSP and Politecnico of Turin (Telecommunication Group) are investigating on WLAN mobile user localization techniques –Currently indoor coverage of WLAN can provide information about user location on AP “Cell-id” : each access point is associated with a section of the building –Poor accuracy –Localization can improve if the user is heard by a set of beacons, then triangulation techniques can be used –Hybrid solutions can be found combining different pieces information available for the communication interface User localization ]

[ 24 Content… ]  CSP profile  Wireless Campus network  User mobility  Security  Further activities

[ 25 Security Goals –Enhanced user authentication mechanisms –Class-based service differentiated access for WLAN users –Security & Mobility Security: what we need ]

[ 26 The Radio Medium is difficult to confine and control WLANs are exposed to different security threats –Sniffing Interception and Eavesdropping –Spoofing and Unauthorized Access –Denial of Service and Flooding Attacks –Network Hijacking and Modification Radio medium weaknesses ]

[ 27 Wired Equivalent Privacy (WEP) is in charge of ciphering data and identifying users for accounting… but… …it is not sufficient to guarantee a good security level for the WLAN infrastructure, in fact there are many security analysis that show WEP’s weaknesses and several tools realized to break it WEP is not sufficient ]

[ x standard is intended to provide strong and mutual authentication between users and WLAN elements, but also access control and key management For these reasons we adopt this standard in conjunction with the Extensible Authentication Protocol (EAP) to implement the security model of Wireless Campus and permit a wide variety of authentication mechanism So let’s use 802.1x ]

[ 29 SupplicantAuthentication ServerAuthenticator Operates on client EAP plug-in goes in RADIUS server Operates on devices at network edge, like APs and switches semi-public network enterprise network enterprise edge EAP over wireless EAP over RADIUS Controlled port: Data traffic Open port: Authentication traffic 802.1x scheme ]

[ 30 The park’s WLAN has to be connected to a cellular operator GPRS network The two access technologies (802.11b and GPRS) can integrate each other in a complementary way but they need two different schemes for user authentication Therefore we will trial SIM based authentication mechanism to let users move between public operator hot-spots and roam as he/she was in his/her home WLAN network Cellular operator side ]

[ 31 SMEsLABs WLAN access network Authentication management Local Authentication RADIUS proxy Telco network Remote Authentication (SIM) Authentication ] RADIUS CSP RADIUS Environment Park

[ 32 Content… ]  CSP profile  Wireless Campus network  User mobility  Security  Further activities

[ 33 Open source –Tools to try and test new features as soon as they are released through draft and proposals –Customize or deploy other enhancements Integration of open source with commercial systems as part of interoperability studies Tools –Access point –Authentication server –Authentication client Integration of the Open Source World ]

[ 34 Ad hoc networking Diffserv on b IPv6 and WLAN mobility (CSP is an IPv6 TLA) Streaming LBS VoIP over WLAN Performance measurements ] R&D activity & future enhancements

[ 35 Thanks! ] Finally… Thanks!

[ 36 Center of Excellence for Research, Development and Experimentation of Advanced Computer Science and Information Technologies Via Livorno Torino [Italy] Building A1lab    Information ]