S ECURING W IRELESS LAN S AND W IRELESS MAN S By Peter Nicola Supervisor: Dr. Michael Hitchens ITEC810 S ECURING WLAN S AND WMAN S
What is it about? WLAN WMAN Conclusion 2 A GENDA
The world is moving from Wired to Wireless Networking. Two forms of Wireless Networking are discussed The need to secure them 3 WLAN WMA N S ECURING WLAN S AND WMAN S W HAT IS IT ABOUT ?
What is it about? WLANs WMANs Conclusion 4 S ECURING WLAN S AND WMAN S A GENDA
What is it? Security Approaches 5 Algorithms Other approaches WEP WPA WPA2 MAC Filtering SSID Broadcast S ECURING WLAN S AND WMAN S WLAN
6 Evil TwinWar Driving S ECURING WLAN S AND WMAN S WLAN T HREATS SSID: Macquarie University Replicated SSID: Macquarie University
7 War Driving S ECURING WLAN S AND WMAN S WLAN Weakly or not Secured Well Secured Google Maps
8 War Driving S ECURING WLAN S AND WMAN S WLAN Search Result in AustraliaSearch Result Worldwide
9 O UTCOME S ECURING WLAN S AND WMAN S WLAN Keep them secured Possible Improvements Algorithm Used Key Complexity SSID Choice - Hiding MAC Filtering Digital IDs Embedded Hardware Encryption Management Software
What is it about? WLANs WMANs Conclusion 10 S ECURING WLAN S AND WMAN S A GENDA
What is it? Security Approaches 11 PKM (Privacy Key Management) Other approaches AK and TEK3DES & X.509 DOCSIS usage Lessons learned from WLAN S ECURING WLAN S AND WMAN S WMAN
12 No PHY layer protection One Way Authentication S ECURING WLAN S AND WMAN S WMAN T HREATS AND V ULNERABILITIES Jamming and DoS
13 S ECURING WLAN S AND WMAN S WMAN One Way Authentication BS SS Certificate Cryptographic capabilities, … AK (valid for 1 70 days) Key Request TEK (valid for 12 hours 7 days) User Traffic So, what is the problem?
14 O UTCOME S ECURING WLAN S AND WMAN S WMAN What can be Improved? Mutual Authentication Physical Layer Protection Shorter Key Life How do BSs authenticate each other?
What is it about? WLANs WMANs Conclusion 15 S ECURING WLAN S AND WMAN S A GENDA
Wide usage of Wireless Networks Perfect security does not exist Operators are encouraged to know what threats are there, and how to be secured against them There is always a room for improvements 16 S ECURING WLAN S AND WMAN S C ONCLUSION
Thanks for your attention 17 S ECURING WLAN S AND WMAN S T HANKS Any Questions?