Wireless Technology & Security
Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute of Electrical and Electronics Engineers Not for profit Not for profit Sets the standards for Sets the standards for What is ? What is ? Set of standards for WLAN Set of standards for WLAN Progressing with technology Progressing with technology Change is denoted with a letter Change is denoted with a letter
Wi-Fi and Wi-Fi (wireless fidelity) Wi-Fi (wireless fidelity) WLAN products that utilize standards WLAN products that utilize standards Wi-Fi Alliance Wi-Fi Alliance Oversees tests of product certification Oversees tests of product certification Products certified Wi-Fi will work with all standards Products certified Wi-Fi will work with all standards
Wireless & Business By By % of enterprises will have wireless applications deployed 65% of enterprises will have wireless applications deployed With mobile devices outnumbering traditional PCs With mobile devices outnumbering traditional PCs -Editors of Computer World
By the dollars Total U.S. spending on wireless communications will grow by 9.3% this year, reaching $158.6 billion. It’s predicted to hit $212.5 billion by 2008, with a 10% compound annual growth rate. Total U.S. spending on wireless communications will grow by 9.3% this year, reaching $158.6 billion. It’s predicted to hit $212.5 billion by 2008, with a 10% compound annual growth rate. -Editors of Computer World
Keys for Growth in Business Improved Security Improved Security Steve will address specifics Steve will address specifics Increased Options involving Increased Options involving Speed Speed Range Range Frequency Frequency -Editors of Computer World
802.11b & a
“a” implemented in 1999 “a” implemented in 1999 After b, 2.4GHz and 11 Mbps After b, 2.4GHz and 11 Mbps Differences from b Differences from b Enhanced data speed to 54 Mbps Enhanced data speed to 54 Mbps Operates in the 5 GHz band Operates in the 5 GHz band Less interference Less interference
802.11g
Speed 54 Mbps Speed 54 Mbps Operates in a 2.4 GHz ISM Band Operates in a 2.4 GHz ISM Band Is it better than a or b? Is it better than a or b? Yes and No Yes and No g
Compatibility of g b b a,b, and g a,b, and g Combination Combination More expensive More expensive
Disadvantages of g Range can be reduced. Range can be reduced. Radio Frequency Radio Frequency Only has 3 fully non-overlapping channels. Only has 3 fully non-overlapping channels. Others can handle up to 11 Others can handle up to 11 Before this standard was fully ratified, n was already being discussed. Before this standard was fully ratified, n was already being discussed.
Advantages of g Compatibility Compatibility “Ultimately it takes the guesswork away from the user.” –Ben Worthen “Ultimately it takes the guesswork away from the user.” –Ben Worthen It’s a “life extension” of b It’s a “life extension” of b Higher speeds with little price increase. Higher speeds with little price increase. Use it when greater coverage is needed and cost is a big factor. Use it when greater coverage is needed and cost is a big factor.
802.11n
Definition n is a newer standard n is a newer standard Proper name = IEEE (International Institute of Electrical and Electronics Engineers) Proper name = IEEE (International Institute of Electrical and Electronics Engineers) The number “11” indicates the IEEE working group within this body, known as TGn. The number “11” indicates the IEEE working group within this body, known as TGn.
IEEE WLAN Standard Over-the-Air (OTA) Estimates Media Access Control Layer, Service Access Point (MAC SAP) Estimates b11 Mbps5 Mbps g54 Mbps25 Mbps (when.11b is not present) a54 Mbps25 Mbps n200+ Mbps100 Mbps Wireless LAN Throughput by IEEE Standard
The hope of implementing n is so that consumers may be able to use more of a range of products. HDTV HDTV Streaming videos Streaming videos Other consumer electonics Other consumer electonics Personal computing Personal computing Hand held platforms Hand held platforms
Where can it be used if implemented? All major environments including: All major environments including: Enterprises Enterprises Households Households Wireless Networks Wireless Networks Public hotspots Public hotspots Coffee Houses (Starbucks, Internet Cafes) Coffee Houses (Starbucks, Internet Cafes) Pizza Parlors (American Dream) Pizza Parlors (American Dream) Schools (OSU entire campus) Schools (OSU entire campus)
What is a hotspot? Hotspot = Hotspot = Public Area Public Area Wireless network connections to the internet Wireless network connections to the internet NIC = Network Interface Card NIC = Network Interface Card Have to ask permission to log onto the network Have to ask permission to log onto the network Sometimes is free other times costs a small fee (i.e. Starbucks) Sometimes is free other times costs a small fee (i.e. Starbucks)
Current Status of n Meeting in January 2006 in Kona, Hawaii Meeting in January 2006 in Kona, Hawaii Wave of the future Wave of the future Price range of $ $ Price range of $ $ Only for a pre-N router Only for a pre-N router
Benefits of n The connection speed is really fast The connection speed is really fast It has a great, wide reaching range It has a great, wide reaching range Comes with software that is compatible with both Windows and Macintoshes. Comes with software that is compatible with both Windows and Macintoshes.
Disadvantages of n It is very expensive as compared with the other routers for b/a/g It is very expensive as compared with the other routers for b/a/g Requires a MIMO adapter to be able to use it full potential. Requires a MIMO adapter to be able to use it full potential. cnet&subj= &tag=
Have the best of the best!!!
Wireless Security References:
Protecting Access and Signal Wireless Security needs to protect two separate parts of the wireless network. Wireless Security needs to protect two separate parts of the wireless network. Access – Control who can access the network Signal – Control who can read the signal.
Controlling Access End to End Encryption End to End Encryption MAC Filtering Controlling which devices can “Log on” to the network This method can be hacked using a MAC Spoof (kind of like identity theft for wireless computers) SSID Broadcasting Do not broadcast the SSID (Service Set Identifier) If the hackers cannot see your network, it is harder to get into One example of end to end encryption is online banking. Ever notice the https?
Controlling the signal WEP – Wireless Equivalent Privacy WEP – Wireless Equivalent Privacy 64 or 128 bit encryption. 64 or 128 bit encryption. Very easy to break. Very easy to break. FBI demonstrated a 3 minute breach using common hacking software 1 FBI demonstrated a 3 minute breach using common hacking software 1 WPA – Wifi Protected Access WPA – Wifi Protected Access This adds additional security features to WEP. This adds additional security features to WEP. Much harder to crack and can use a pre-shared key (PSK) Much harder to crack and can use a pre-shared key (PSK) Like a secret password Like a secret password Based on the i standard Based on the i standard WPA2 – WPA with AES WPA2 – WPA with AES (Advanced Encryption Standard) (Advanced Encryption Standard) Algorithm from WPA is replaced by a message authentication code, CCMP Algorithm from WPA is replaced by a message authentication code, CCMP CCMP
Other ways to get secured VPN – Virtual Private Network VPN – Virtual Private Network Two types – Secure and Unsecured Two types – Secure and Unsecured Secured VPN Secured VPN uses cryptographic tunneling protocols to provide the necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), and message integrity (preventing message alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networks uses cryptographic tunneling protocols to provide the necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), and message integrity (preventing message alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networkscryptographictunnelingconfidentialitysnoopingauthenticationidentityspoofingmessageintegrityprivacycryptographictunnelingconfidentialitysnoopingauthenticationidentityspoofingmessageintegrityprivacy
Connecting to OSU_PUB Domain Enable Wireless LAN on your device Enable Wireless LAN on your device Go to the internet Go to the internet Browser will redirect you to the wireless security page for OSU (See next page) Browser will redirect you to the wireless security page for OSU (See next page) Enter login information (See next page) Enter login information (See next page) Enter computer information (See next page) Enter computer information (See next page) Quit browser (15-20 min) Quit browser (15-20 min) Surf Surf Your computer is now permanently registered with OSU (College of Engineering) Your computer is now permanently registered with OSU (College of Engineering)
Questions?