Wireless Technology & Security. Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute.

Slides:



Advertisements
Similar presentations
INTRODUCTION TO Wi-Fi TECHNOLOGY.
Advertisements

Wireless Fidelity.  Short for wireless fidelity.  It is a wireless technology that uses radio frequency to transmit data through the air.  Wi-Fi is.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Fen Shih Feb, 2011 Wireless N 300 Dual Band PCIe Desktop Adapter.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
WiMAX Introduction Worldwide Interoperability for Microwave Access
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
TPS Reports Presents… A Wireless Report Joy Gibbons Julia Grant Kelsie Kirkpatrick Kevin Moore Byron Williams Image from:
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
Wireless Local Area Technology.  Garikayi Brasington Madzudzo  Edmund Nartey  Ismeil Ahamed  Jakub Gieryn  Arnaud Fogno.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
Wireless Networks Tamus, Zoltán Ádám
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Sybex CCNA Chapter 12: Wireless Networks.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
PRESENTATION ON WI-FI TECHNOLOGY
WEP Protocol Weaknesses and Vulnerabilities
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wireless Networking & Security Greg Stabler Spencer Smith.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Lecture 24 Wireless Network Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Without wires IMKE SPI2009 Kaido Kikkas. WiFi – what's that? ● Actually a trademark of the Wi-Fi Alliance or WECA (Wireless Equipment Compatibility Alliance)
Wireless Access Point Product Overview
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
4 Mobile Computing 2 SKS Dedy Alamsyah, S.Kom..
Wireless Access Point Product Overview
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Local Area Network (WLAN)
Presentation transcript:

Wireless Technology & Security

Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute of Electrical and Electronics Engineers Not for profit Not for profit Sets the standards for Sets the standards for What is ? What is ? Set of standards for WLAN Set of standards for WLAN Progressing with technology Progressing with technology Change is denoted with a letter Change is denoted with a letter

Wi-Fi and Wi-Fi (wireless fidelity) Wi-Fi (wireless fidelity) WLAN products that utilize standards WLAN products that utilize standards Wi-Fi Alliance Wi-Fi Alliance Oversees tests of product certification Oversees tests of product certification Products certified Wi-Fi will work with all standards Products certified Wi-Fi will work with all standards

Wireless & Business By By % of enterprises will have wireless applications deployed 65% of enterprises will have wireless applications deployed With mobile devices outnumbering traditional PCs With mobile devices outnumbering traditional PCs -Editors of Computer World

By the dollars Total U.S. spending on wireless communications will grow by 9.3% this year, reaching $158.6 billion. It’s predicted to hit $212.5 billion by 2008, with a 10% compound annual growth rate. Total U.S. spending on wireless communications will grow by 9.3% this year, reaching $158.6 billion. It’s predicted to hit $212.5 billion by 2008, with a 10% compound annual growth rate. -Editors of Computer World

Keys for Growth in Business Improved Security Improved Security Steve will address specifics Steve will address specifics Increased Options involving Increased Options involving Speed Speed Range Range Frequency Frequency -Editors of Computer World

802.11b & a

“a” implemented in 1999 “a” implemented in 1999 After b, 2.4GHz and 11 Mbps After b, 2.4GHz and 11 Mbps Differences from b Differences from b Enhanced data speed to 54 Mbps Enhanced data speed to 54 Mbps Operates in the 5 GHz band Operates in the 5 GHz band Less interference Less interference

802.11g

Speed 54 Mbps Speed 54 Mbps Operates in a 2.4 GHz ISM Band Operates in a 2.4 GHz ISM Band Is it better than a or b? Is it better than a or b? Yes and No Yes and No g

Compatibility of g b b a,b, and g a,b, and g Combination Combination More expensive More expensive

Disadvantages of g Range can be reduced. Range can be reduced. Radio Frequency Radio Frequency Only has 3 fully non-overlapping channels. Only has 3 fully non-overlapping channels. Others can handle up to 11 Others can handle up to 11 Before this standard was fully ratified, n was already being discussed. Before this standard was fully ratified, n was already being discussed.

Advantages of g Compatibility Compatibility “Ultimately it takes the guesswork away from the user.” –Ben Worthen “Ultimately it takes the guesswork away from the user.” –Ben Worthen It’s a “life extension” of b It’s a “life extension” of b Higher speeds with little price increase. Higher speeds with little price increase. Use it when greater coverage is needed and cost is a big factor. Use it when greater coverage is needed and cost is a big factor.

802.11n

Definition n is a newer standard n is a newer standard Proper name = IEEE (International Institute of Electrical and Electronics Engineers) Proper name = IEEE (International Institute of Electrical and Electronics Engineers) The number “11” indicates the IEEE working group within this body, known as TGn. The number “11” indicates the IEEE working group within this body, known as TGn.

IEEE WLAN Standard Over-the-Air (OTA) Estimates Media Access Control Layer, Service Access Point (MAC SAP) Estimates b11 Mbps5 Mbps g54 Mbps25 Mbps (when.11b is not present) a54 Mbps25 Mbps n200+ Mbps100 Mbps Wireless LAN Throughput by IEEE Standard

The hope of implementing n is so that consumers may be able to use more of a range of products. HDTV HDTV Streaming videos Streaming videos Other consumer electonics Other consumer electonics Personal computing Personal computing Hand held platforms Hand held platforms

Where can it be used if implemented? All major environments including: All major environments including: Enterprises Enterprises Households Households Wireless Networks Wireless Networks Public hotspots Public hotspots Coffee Houses (Starbucks, Internet Cafes) Coffee Houses (Starbucks, Internet Cafes) Pizza Parlors (American Dream) Pizza Parlors (American Dream) Schools (OSU entire campus) Schools (OSU entire campus)

What is a hotspot? Hotspot = Hotspot = Public Area Public Area Wireless network connections to the internet Wireless network connections to the internet NIC = Network Interface Card NIC = Network Interface Card Have to ask permission to log onto the network Have to ask permission to log onto the network Sometimes is free other times costs a small fee (i.e. Starbucks) Sometimes is free other times costs a small fee (i.e. Starbucks)

Current Status of n Meeting in January 2006 in Kona, Hawaii Meeting in January 2006 in Kona, Hawaii Wave of the future Wave of the future Price range of $ $ Price range of $ $ Only for a pre-N router Only for a pre-N router

Benefits of n The connection speed is really fast The connection speed is really fast It has a great, wide reaching range It has a great, wide reaching range Comes with software that is compatible with both Windows and Macintoshes. Comes with software that is compatible with both Windows and Macintoshes.

Disadvantages of n It is very expensive as compared with the other routers for b/a/g It is very expensive as compared with the other routers for b/a/g Requires a MIMO adapter to be able to use it full potential. Requires a MIMO adapter to be able to use it full potential. cnet&subj= &tag=

Have the best of the best!!!

Wireless Security References:

Protecting Access and Signal Wireless Security needs to protect two separate parts of the wireless network. Wireless Security needs to protect two separate parts of the wireless network.  Access – Control who can access the network  Signal – Control who can read the signal.

Controlling Access End to End Encryption End to End Encryption  MAC Filtering  Controlling which devices can “Log on” to the network  This method can be hacked using a MAC Spoof  (kind of like identity theft for wireless computers)  SSID Broadcasting  Do not broadcast the SSID (Service Set Identifier)  If the hackers cannot see your network, it is harder to get into  One example of end to end encryption is online banking. Ever notice the https? 

Controlling the signal WEP – Wireless Equivalent Privacy WEP – Wireless Equivalent Privacy 64 or 128 bit encryption. 64 or 128 bit encryption. Very easy to break. Very easy to break. FBI demonstrated a 3 minute breach using common hacking software 1 FBI demonstrated a 3 minute breach using common hacking software 1 WPA – Wifi Protected Access WPA – Wifi Protected Access This adds additional security features to WEP. This adds additional security features to WEP. Much harder to crack and can use a pre-shared key (PSK) Much harder to crack and can use a pre-shared key (PSK) Like a secret password Like a secret password Based on the i standard Based on the i standard WPA2 – WPA with AES WPA2 – WPA with AES (Advanced Encryption Standard) (Advanced Encryption Standard) Algorithm from WPA is replaced by a message authentication code, CCMP Algorithm from WPA is replaced by a message authentication code, CCMP CCMP

Other ways to get secured VPN – Virtual Private Network VPN – Virtual Private Network Two types – Secure and Unsecured Two types – Secure and Unsecured Secured VPN Secured VPN uses cryptographic tunneling protocols to provide the necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), and message integrity (preventing message alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networks uses cryptographic tunneling protocols to provide the necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), and message integrity (preventing message alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networkscryptographictunnelingconfidentialitysnoopingauthenticationidentityspoofingmessageintegrityprivacycryptographictunnelingconfidentialitysnoopingauthenticationidentityspoofingmessageintegrityprivacy

Connecting to OSU_PUB Domain Enable Wireless LAN on your device Enable Wireless LAN on your device Go to the internet Go to the internet Browser will redirect you to the wireless security page for OSU (See next page) Browser will redirect you to the wireless security page for OSU (See next page) Enter login information (See next page) Enter login information (See next page) Enter computer information (See next page) Enter computer information (See next page) Quit browser (15-20 min) Quit browser (15-20 min) Surf Surf Your computer is now permanently registered with OSU (College of Engineering) Your computer is now permanently registered with OSU (College of Engineering)

Questions?