Wi-Fi the 802.11 Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wireless Fidelity.  Short for wireless fidelity.  It is a wireless technology that uses radio frequency to transmit data through the air.  Wi-Fi is.
Pengantar Teknologi Mobile 4 Antonius Rachmat C, S.Kom Wireless Fidelity.
Security in Wireless Networks Juan Camilo Quintero D
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
CIT In this chapter you will learn how to:  Describe the basics of wireless networking  Explain the differences between wireless networking standards.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
WiMAX Introduction Worldwide Interoperability for Microwave Access
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Wireless Technology & Security. Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Securing a Wireless Network
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Networking.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
Computer Concepts 2014 Chapter 5 Local Area Networks.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
A PRESENTATION ON “Wireless Networks”
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
IEEE standards (Wireless LANs) Presented by Danu Hunskunatai.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Lecture 24 Wireless Network Security
Wi-Fi and Security What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
1 Wi-Fi, Wireless Broadband, Sensor & Personal Area Networks –Standards –Applications Broadband Wireless Access –WiMAX –Adapting 3G for WBA: UMTS.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
COMPUTER FUNDAMENTALS David Samuel Bhatti
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Chapter-7 Basic Wireless Concepts and Configuration.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
Objective of this Presentation To understand what is Wi-Fi and what is Bluetooth. Difference between Bluetooth and Wi-Fi.
Understand Wireless Security LESSON Security Fundamentals.
Wireless Networks Dave Abbott.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
4 Mobile Computing 2 SKS Dedy Alamsyah, S.Kom..
Wireless Fidelity 1 1.
How To Set Up A Wireless Network
Wireless Networking Chapter 23.
By Markus Kriechhammer
Presentation transcript:

Wi-Fi the Standard and Security

What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit data through the air. Wi-Fi is based on the standard: – a – b – g

Wi-Fi Alliance Non-profit standards organization. Global organization that created the Wi-Fi brand name. Formerly the Wireless Ethernet Compatibility Alliance.

Wi-Fi Certification The Wi-Fi CERTIFIED logo from the Wi-Fi Alliance. – Rigorous interoperability testing requirements. – Certifies the interoperability of products from the many different vendors.

Wi-Fi HotSpots Pay Services – Boingo – iPass – Cingular Wireless – MyConnect – WayPort Free Wi-Fi in Springfield: – Downtown: Springfield Chamber of Commerce – Mud House – Panera Bread

Brief History IEEE (Institute of Electrical and Electronics Engineers) established the Group in Specifications for standard ratified in Initial speeds were 1 and 2 Mbps. IEEE modified the standard in 1999 to include: – b – a – g was added in IEEE Created standard, but Wi-Fi Alliance certifies products

Standard is primarily concerned with the lower layers of the OSI model. Data Link Layer – Logical Link Control (LLC). – Medium Access Control (MAC). Physical Layer – Physical Layer Convergence Procedure (PLCP). – Physical Medium Dependent (PMD).

802.11b Standard Well-supported, stable, and cost effective, but runs in the 2.4 GHz range that makes it prone to interference from other devices (microwave ovens, cordless phones, etc) and also has security disadvantages. Limits the number of access points in range of each other to three. Has 11 channels, with 3 non-overlapping, and supports rates from 1 to 11 Mbps, but realistically about 4-5 Mbps max. Uses direct-sequence spread-spectrum technology.

802.11g Standard Extension of b, with the same disadvantages (security and interference). Has a shorter range than b. Is backwards compatible with b so it allows or a smooth transition from 11b to 11g. Flexible because multiple channels can be combined for faster throughput, but limited to one access point. Runs at 54 Mbps, but realistically about Mbps and about 14 Mbps when b associated Uses frequency division multiplexing

802.11a Standard Completely different from 11b and 11g. Flexible because multiple channels can be combined for faster throughput and more access points can be co-located. Shorter range than 11b and 11g. Runs in the 5 GHz range, so less interference from other devices. Has 12 channels, 8 non-overlapping, and supports rates from 6 to 54 Mbps, but realistically about 27 Mbps max Uses frequency division multiplexing

Advantages Freedom – You can work from any location that you can get a signal. Setup Cost – No cabling required. Flexibility – Quick and easy to setup in temp or permanent space. Scaleable – Can be expanded with growth. Mobile Access – Can access the network on the move.

Disadvantages Speed – Slower than cable. Range – Affected by various medium. – Travels best through open space. – Reduced by walls, glass, water, etc Security – Greater exposure to risks. – Unauthorized access. – Compromising data. – Denial of service.

Basic Security Strategies Block your Service Set Identifier (SSID) from being broadcast. – Wireless beacon so PCs can easily find the access point. Change the default network name in the access point. Change the default access point password. Center the access point in the middle of the building/house.

Media Access Control (MAC) Filtering Every network device has a unique MAC address – Allocated by the manufacturer. MAC Filtering only allows certain addresses access. Mostly for home use. – Tedious to implement on a large scale

Wired Equivalency Protocol (WEP) Basic encryption technology. – Uses an RC4 stream cipher. Pseudo-random bytes. – Two versions: 64-bit and 128-bit versions. Built into Wi-Fi certified equipment. – Implemented at the MAC level. Protects radio signal between device and access point. – Does not protect data beyond the access point. Uses static encryption keys. – Easy to crack. Still better then nothing.

Wi-Fi Protected Access (WPA) Designed to replace WEP. – Firmware update. – 128-bit Temporal Key Integrity Protocol (TKIP) encryption. Uses a master key that is regularly changed. – User authentication. – Data Integrity. Protects radio signal between device and access point. Built into Wi-Fi certified equipment. – Implemented at the MAC level. Available in two versions: – WPA2 Personal. – WPA2 Enterprise.

Wi-Fi Protected Access 2 (WPA2) Designed to replace WEP. – 128-bit Advanced Encryption Standard (AES). Based on the IEEE i standard. Provides government level security. Also available in two versions: – WPA2 Personal. – WPA2 Enterprise.

Extended EAP EAP - Extensible Authentication Protocol. Addition to the Wi-Fi Protected Access. – Used in internal network. Extra security for enterprise and government Wi-Fi LANs. Several versions available.

Virtual Private Network (VPN) Creates a secure virtual “tunnel” from remote device to VPN server. – Creates an encryption scheme. – Requires authentication. Works across the internet. Many types and levels of VPN technology. – May include hardware and software components. – Some very expensive. – Windows provides a basic implementation in its server software.

Firewall Can make the network or computer invisible to the internet. Block unauthorized users. Monitor and control flow of data to/from a network or computer. Many types and levels of firewall technology. – Hardware and software combinations – Software only versions. ZoneAlarm Many devices provide basic firewall capability. – Gateways and access points. Network address translation. – Windows XP operating system.

Kerberos Created at MIT. Network authentication based on key distribution. – Nodes provide their own authentication. Checks for data stream integrity. – Checks for modification. Uses Data Encryption Standard (DES).

Bringing it all together Any combination of these security techniques can be used. The more security the more of a hassle. – Important when supporting users.