Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 10 – Wireless Security
Advertisements

Wireless Fidelity.  Short for wireless fidelity.  It is a wireless technology that uses radio frequency to transmit data through the air.  Wi-Fi is.
CIT In this chapter you will learn how to:  Describe the basics of wireless networking  Explain the differences between wireless networking standards.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wired Equivalent Privacy (WEP)
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Securing a Wireless Network
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Wireless Networking.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Communications Channel & transmission media
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Data Communication. 2 Data Communications Data communication system components: Message Message Information (data) to be communicated. Sender Sender Device.
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
Wireless Networks Tamus, Zoltán Ádám
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
PRESENTATION ON WI-FI TECHNOLOGY
Wireless Encryption: WEP and cracking it. Eric Shea.
MASNET GroupXiuzhen ChengFeb 8, 2006 Terms and Concepts Behind Wireless Communications.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Topic : 4.0 WIRELESS TECHNOLOGIES.  Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless.
Wireless Networking Chapter 12. Chapter Objectives Identify wireless networking Compare wireless and wired network Explain the different wireless standards.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Access Point Extender/bridge Radio card SSID - Service Set Identifier “An identifier attached to packets sent over the wireless LAN that functions as a.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Wireless Networks Dave Abbott.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Attacks: WEP Module Type: Basic Method Module Number: 0x00
SUBMITTED BY DINEEJ A 28 S3 EC
Network connectivity to the legacy wired LAN
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Wireless Networking Chapter 23.
Physical Transmission
Security Issues with Wireless Protocols
Network connectivity to the legacy wired LAN
Presentation transcript:

Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05

Wireless Networks: Primer Networks are set up AD Hoc Or a Hardware/ Software Access Point is Used to Connect Devices

Wireless Networks: Primer Several Wireless Technologies  Bluetooth  IrDA  Standard a b g n

Wireless Networks: Primer Wireless Technologies (cont.)  PCS  WAP  WTLS  WML  Wi-Fi  HomeRF  Most of the above are not as popular

Bluetooth Low Cost Small Range (<10 M) Mediocre Speed (700 Kbps)

IrDA Used in Inventory Needs Clear LOS Needs short Distance Used Mostly in Desktop Cable Replacement

The Standard a  Fastest Maximum Speed (54 Mbps)  Supports More Simultaneous Users  Higher Cost  Shorter Range

The Standard b  Slowest Maximum Speed (11 Mbps)  Longer range (Less Obstruction)  More Signal Noise (2.4 GHz)

The Standard g  Fastest Maximum Speed (54 Mbps)  Longer range (Less Obstruction)  Backwards Compatible with b  Combines best of a and b

The Standard n  Utilizes Multiple Wireless Antennas  Coordinates Multiple Signals  Fastest Speeds ( Mbps)  No Word on Compatibility (Drafts)  Expected in 2006

Specifics Protocols operate on the physical layer MAC addressing is done at the Data Link layer Authentication is done by ‘handshake’ structure

Problem Definition: Wireless Networking:  Physical Limitations  Security Methods of Improvement  Signal Strengthening  Security Protocols

The Electromagnetic Spectrum Wireless Networks Operate at 2.4 GHz (2.4 x 10^6) Low Traffic and Standardized

Physical Propagation Radio Waves are sent via a transmitter and a receiver Data rate dependant on frequency Signal Strength is based on Power (Watts)

Signal Strength Signal power is amplitude of wave Attenuation occurs (Humidity) Amplifiers boost signal strength Weakening and Strengthening given in Decibels

Example of Signal Taken Using g at Close Range

Antennas Responsible for converting electrical impulses into radio waves Omni directional Antennas Directional Antennas

Physical Layer Security Has not been a major problem for wired networks Wireless is highly susceptible to physical sniffing No security by default

Wired Equivalent Privacy Uses encrypted keys Key Length (64, 128 bit) Initialization Vectors (24 bits)  16.7 Million Possibilities (Low)

Initialization Vectors No check for duplication Weakens the cryptographic system Weak Keys are used

Cracking WEP: How To Wireless Card capable of being ‘passive’ (sniffing) Packet/IV collection software Modified Brute Force WEP Cracking Software

Cracking WEP: Using Aircrack Aircrack includes Airodump Aircrack includes Aircrack Aircrack can be run on Windows! (using CygWin1.dll)

Aircrack Sniffing Example 15 min of collection on Medium Traffic 128 bit WEP g

Aircrack Cracking Example 500k IV’s found from packets

Conclusion If using WEP, use 128 bit keys Use MAC Address Filtering Don’t Broadcast Your SSID Download Useful Programs and Most of all… Enable Some Security!

Questions?