S ECURING W IRELESS LAN S AND W IRELESS MAN S By Peter Nicola Supervisor: Dr. Michael Hitchens ITEC810 S ECURING WLAN S AND WMAN S.

Slides:



Advertisements
Similar presentations
An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption By Arpan Pal Wireless Group Center of Excellence for Embedded Systems.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Securing a Wireless Network
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Wi-Fi Standards Lucy Nguyen Corey Trouard Zack Wepasnick.
Presented by: Dr. Munam Ali Shah
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Peter Peerdeman Introduction Overview Wireless security Fon network Security scenarios Conclusion Wireless security Fon network Security.
Stephan Bayer September 9, 2004 INLS 187. What is it? War Driving Software – WarDriving v. The benign act of locating and logging wireless access points.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless security Wi–Fi (802.11) Security
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wired Equivalent Privacy. INTRODUCTION Wired Equivalent Privacy (WEP) is a security algorithm for IEEE wireless networks. Introduced as part of.
Understand Wireless Security LESSON Security Fundamentals.
History and Implementation of the IEEE 802 Security Architecture
Securing A Wireless Network
Configure a Wireless Router
LM 5. Wireless Network Security
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Presentation transcript:

S ECURING W IRELESS LAN S AND W IRELESS MAN S By Peter Nicola Supervisor: Dr. Michael Hitchens ITEC810 S ECURING WLAN S AND WMAN S

What is it about? WLAN WMAN Conclusion 2 A GENDA

The world is moving from Wired to Wireless Networking. Two forms of Wireless Networking are discussed The need to secure them 3 WLAN WMA N S ECURING WLAN S AND WMAN S W HAT IS IT ABOUT ?

What is it about? WLANs WMANs Conclusion 4 S ECURING WLAN S AND WMAN S A GENDA

What is it? Security Approaches 5 Algorithms Other approaches WEP WPA WPA2 MAC Filtering SSID Broadcast S ECURING WLAN S AND WMAN S WLAN

6 Evil TwinWar Driving S ECURING WLAN S AND WMAN S WLAN T HREATS SSID: Macquarie University Replicated SSID: Macquarie University

7 War Driving S ECURING WLAN S AND WMAN S WLAN Weakly or not Secured Well Secured Google Maps

8 War Driving S ECURING WLAN S AND WMAN S WLAN Search Result in AustraliaSearch Result Worldwide

9 O UTCOME S ECURING WLAN S AND WMAN S WLAN Keep them secured Possible Improvements Algorithm Used Key Complexity SSID Choice - Hiding MAC Filtering Digital IDs Embedded Hardware Encryption Management Software

What is it about? WLANs WMANs Conclusion 10 S ECURING WLAN S AND WMAN S A GENDA

What is it? Security Approaches 11 PKM (Privacy Key Management) Other approaches AK and TEK3DES & X.509 DOCSIS usage Lessons learned from WLAN S ECURING WLAN S AND WMAN S WMAN

12 No PHY layer protection One Way Authentication S ECURING WLAN S AND WMAN S WMAN T HREATS AND V ULNERABILITIES Jamming and DoS

13 S ECURING WLAN S AND WMAN S WMAN One Way Authentication BS SS Certificate Cryptographic capabilities, … AK (valid for 1  70 days) Key Request TEK (valid for 12 hours  7 days) User Traffic So, what is the problem?

14 O UTCOME S ECURING WLAN S AND WMAN S WMAN What can be Improved? Mutual Authentication Physical Layer Protection Shorter Key Life How do BSs authenticate each other?

What is it about? WLANs WMANs Conclusion 15 S ECURING WLAN S AND WMAN S A GENDA

Wide usage of Wireless Networks Perfect security does not exist Operators are encouraged to know what threats are there, and how to be secured against them There is always a room for improvements 16 S ECURING WLAN S AND WMAN S C ONCLUSION

Thanks for your attention 17 S ECURING WLAN S AND WMAN S T HANKS Any Questions?