Security Management of WLANs in Streaming Overlays 學生 : 黃立恆 林世國 指導教授 : 林華君.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Computer Networking Components Chad DuBose ~ Assignment #3 ~ LTEC
控制原理與設計期中報告 指導教授:曾慶耀 學 號: 學 生:楊長諺.  Introduction  System Modeling of the PMAC Motor  Neural - Network - Based Self - Tuning PI Control System.
1 A Low Power CMOS Low Noise Amplifier for Ultra-wideband Wireless Applications 指導教授 : 林志明 學生 : 黃世一
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
CS 590M Fall 2001: Security Issues in Data Mining Lecture 3: Classification.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
1 Wireless LAN Security Presented by Vikrant Karan.
GPS-free Positioning in Ad-Hoc Networks Yu-Min Tseng.
Barcode Readers using the Camera Device in Mobile Phones 指導教授:張元翔 老師 學生:吳思穎 /05/25.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Network Components: Assignment Three
Common Devices Used In Computer Networks
Copyright © 2010, OpenFlow - Innovate in Your Network 指導教授:王國禎 學生:洪維藩 國立交通大學資訊科學與工程研究所 行動計算與寬頻網路實驗室.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
Bayesian Indoor Positioning Systems Presented by: Eiman Elnahrawy Joint work with: David Madigan, Richard P. Martin, Wen-Hua Ju, P. Krishnan, A.S. Krishnakumar.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
1 A Low Spur Fractional-N Frequency Synthesizer Architecture 指導教授 : 林志明 教授 學生 : 黃世一 Circuits and Systems, ISCAS IEEE International Symposium.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
出處: Signal Processing and Communications Applications, 2006 IEEE 作者: Asanterabi Malima, Erol Ozgur, and Miijdat Cetin 2015/10/251 指導教授:張財榮 學生:陳建宏 學號: M97G0209.
ARP Spoofing Attacks Dr. Neminath Hubballi IIT Indore © Neminath Hubballi.
報告人:林祐沁 學生 指導教授:童曉儒 老師 March 2, Wireless Video Surveillance Server Based on CDMA1x and H.264.
A Survey of Geocast Routing Protocols 指導教授:許子衡 教授 報告學生:馬敏修 指導教授:許子衡 教授 報告學生:馬敏修.
This paper appears in: Computer Communications and Networks, ICCCN Proceedings.15th International Conference on 指導教授 : 許子衡 報告者 : 黃群凱 1.
電腦網路 By 王丕中 國立中興大學 資訊科學系.
Final Year Project Lego Robot Guided by Wi-Fi (QYA2) Presented by: Li Chun Kit (Ash) So Hung Wai (Rex) 1.
Final Year Project Lego Robot Guided by Wi-Fi (QYA2)
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
A seamless handover between cdma2000 and WLAN for 3G-WLAN interworking service continuity 指導教授:黃培壝 學生:陳鵬宇.
Lecture 24 Wireless Network Security
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
January 2003 Richard Paine, Boeing Slide 1 doc.: IEEE /087r0 Submission Slide 1 Richard Paine, Boeing Voice Over IP Scenario For IEEE k.
Network/Computer Security Workshop, May 06 The Robustness of Localization Algorithms to Signal Strength Attacks A Comparative Study Yingying Chen, Konstantinos.
Smart and Secure Home 指導教授:曾建超 教授 學生:何承運、郭冠廷、陳佩玟、林詩庭 Computer Science
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Networking Components Assignment 3 Corbin Watkins.
Networking Components
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
ASSIGNMENT 3 - NETWORKING COMPONENTS BY JONATHAN MESA.
Hybrid Indoor Positioning with Wi-Fi and Bluetooth: Architecture and Performance IEEE Mobile Data Management 2013 Artur Baniukevic†, Christian S. Jensen‡,
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
Recap of Layers Application, Data Link and Physical.
Spectrum Utilization The goals of this project: (1) Development of algorithms for the distributed detection of incumbents/trespassers in any frequency.
Understand how a router works and its purpose
Distributed Systems.
The OSI Model and the TCP/IP Protocol Suite
ITIS 1210 Introduction to Web-Based Information Systems
Subway Station Real-time Indoor Positioning System for Cell Phones
The OSI Model and the TCP/IP Protocol Suite
AirPlace Indoor Positioning Platform for Android Smartphones
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Network Models, Hardware, Protocols and number systems
Reason Why L2 Per Frame Authentication Is Required
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite
Information Technology
Protocols 1 Key Revision Points.
Network Hardware and Protocols
Security and Privacy in Pervasive/Ubiquitous Computing Systems
The OSI Model and the TCP/IP Protocol Suite
Computer Networks ARP and RARP
Presentation transcript:

Security Management of WLANs in Streaming Overlays 學生 : 黃立恆 林世國 指導教授 : 林華君

2 Security Threats of WLANs in Streaming Overlays Internet Streaming server Rogue AP  DoS/DDoS  IP/MAC spoofing  Eavesdropping  Data alteration Rogue AP  DoS/DDoS  IP/MAC spoofing  Eavesdropping  Data alteration AP

3 Purposes Detect rogue mobile devices Find the location of rogue mobile devices Streaming Server 1 Rogue AP AP Internet Streaming Server 2 AP Snooper 3 Snooper 1 Snooper 2 Detection and localization server

4 Detect Rogue Mobile Devices White list Legal Devices : MAC address in the White List Rogue Devices : MAC address not in the White List

5 Find the Location of Rogue Devices Location Systems Types of location systems Snooper-based Location System Need snoopers Client-based Location System

6 Location Syetems (1/2) Two phases of a snooper-based location system : Training phase Training Set Location Estimation Phase Computation and use location algorithms

7 Location Syetems (2/2) Techniques of location systems : Radio Propagation Model Lateration triangulation Average error distance : 4~5 m Static Scene Analysis K-Nearest Neighbors Simple Point Matching Bayesian Inference Conditional Probability Average error distance : 2~3 m

8 Architecture of 0ur Location System Rogue AP Snooper 4 Snooper 6 Snooper 2 Detection and localization server Snooper 1 Snooper 5 Snooper 3 Switch

9 Components of our Location System Snoopers Receive signal strength Send information to server Training machine Send packets → Training set Detection and Localization server Computation and analysis Detection Location

10 Progress Setup of snoopers (completed) Software for snoopers (completed) Software for training machine (completed) Training Software for detection Software for localization Fine tuning