Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
802.1x EAP Authentication Protocols
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Securing a Wireless Network. Wireless networks are rapidly becoming pervasive. How many of you have web-enabled cell phones? How many of you have web-enabled.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless Networking.
Perceptions of Wi-Fi Security Requirements: A Stratified View Merrill Warkentin Xin (“Robert”) Luo Mississippi State University.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Presented by: Dr. Munam Ali Shah
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Securing your wireless LAN Paul DeBeasi VP Marketing
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
PRESENTATION ON WI-FI TECHNOLOGY
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Understand Wireless Security LESSON Security Fundamentals.
Instructor Materials Chapter 6 Building a Home Network
Chapter 4: Wireless LANs
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Presentation transcript:

Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies, Inc.

Agenda 1. Introduction 2. First Generation WLANs 3. Second Generation WLANs 4. Curricula Issues 5. Conclusions

Introduction Ubiquitous wireless networks –Uncontrolled media / self-deploying network –Wired vs. Wireless networks –Early WLANs slow and not very secure –Today’s WLANs have more choices for enhanced security, but are still flawed Need to incorporate WLAN and WLAN security concepts in our curriculum

WLANs Ad-Hoc [Independent Basic Service Set (IBSS)] - computers talk directly to each other. Basic Infrastructure [Basic Service Set (BSS)] Network - all traffic passes through a wireless access point. Infrastructure [Extended Service Set (ESS)] Network - traffic passes through multiple wireless access points.

First Generation WLANs The IEEE specification allows for the wireless transmission of raw data at indoor distances from several dozen to several hundred feet and outdoor distances of several to tens of miles using Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)Carrier Sense Multiple AccessCSMA/CA –802.11b - 11 Mbps using the 2.4 GHz –802.11a – 54 Mbps using the 5 GHz band –802.11g – 54 Mbps using 2.4 GHz –802.11n – 540 Mbps (supports MIMO)

First Generation WLANs –Minimal set of security features in b standard Service Set Identifier (SSID) Medium Access Control (MAC) address filters Wired Equivalent Privacy (WEP) encryption – 64-bit RC4 data encryption (flawed) [128-bit WEP also available] –Does prevent casual “eavesdropping” (if turned on) –Requires a sharing of the key between each mobile device and the access point –No procedure for key management

First Generation WLANs –Main Security Vulnerabilities Security settings are not enabled by default By default, access points broadcast SSID in clear text MAC address of valid client can be “sniffed” and then spoofed WEP is easily broken, only authenticates client Rogue access points are easy to deploy Man-in-the-middle attacks WLANs are easily crashed by DoS attacks

First Generation WLANs –Security Controls Turn off the broadcast SSIDs Use automated MAC-based access control mechanisms Enable WEP encryption Lower power levels of access points / limit transmission rates (11 / 5.5 Mbps)

Second Generation WLANs WPA (Wi-Fi Protected Access) – interim encryption standard: FLAWED i –Temporal Key Integrity Protocol (TKIP) uses RC4 generates new key every 10 Kb hashes Initialization Vector Message Integrity Check –Advanced Encryption Standard (AES)

Second Generation WLANs 802.1X: Framework for Authentication (EAP – Extensible Authentication Prototcol) –Transport Layer Security (EAP-TLS): used in 802.1X clients for Windows XP –Lightweight EAP (LEAP): CISCO product used in Aironet products (dynamic WEP) –Protected EAP (PEAP): CISCO/Microsoft/RSA – doesn’t require certificates; supports dynamic WEP –Tunneled Transport Layer Security (EAP-TTLS): Funk Software/Certicom – only requires server certification

Second Generation WLANs VPN (Virtual Private Network) Wireless Gateway (simplifies roaming and provides opportunity to implement QoS) AirDefense – WLAN Monitoring AirFortress – provides for encryption at the MAC layer, hiding data and network information

Policies, Training, & Awareness Physical location of access points Logical location of access points (in DMZ) Ban rogue access points (monitor) Disable ad-hoc (peer-to-peer) mode on all clients Properly configure all devices Standardize on one vendor Perform frequent site surveys Monitor logs Keep patches up to date

Curricula Issues Where? –Networking and Network Management Courses –Introductory Security Courses –Network Security Courses –Cryptography Course (look at RC4/WPA/AES encryption algorithms)

Curricula Issues What? –Policy Standards for wireless networks –Designing wireless networks –Securing wireless networks –look at encryption algorithms (RC4, WPA, AES) –Look at standards (802.11i, 802.1X)

Curricula Issues How? –Design Wireless Network Policy –Work with University IT Department to help survey security for campus wireless network –Installing and testing wireless networks –War-driving (discuss ethical issues) –Attack / Defend Exercises

Conclusions Ubiquitous wireless networks –Home use –Coffee shops, local communities –IEEE (WiMAX) - 75 Mb/sec, up to 30 miles Need to teach students how to secure them

Resources Wireless Security Blackpaper - y-1.html y-1.html Wireless LAN Security FAQ The Unofficial Security Web Page Wireless Network Security , Bluetooth and Handheld Devices /NIST_SP_ pdf 48/NIST_SP_ pdf

Questions?