Communication System Design, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars Adolfsson.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Secure Mobile IP Communication
Security in Wireless Networks Juan Camilo Quintero D
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Chudi IgboemekaITSS, Stanford University 04/2002 Campus Wireless Update Chudi Igboemeka Academic Technology, Pilots & Projects ITSS.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Remote Access Chicca Kusumawardani Spring Introduction Company using a remote access Is it a good idea giving employees remote access? Is it expensive.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
Wireless Networks Tamus, Zoltán Ádám
Communication System Design 2002, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
PRESENTATION ON WI-FI TECHNOLOGY
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
IS Network and Telecommunications Risks Chapter Six.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
DNS and IP Scalability Communication Systems Design 2002.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Lecture 24 Wireless Network Security
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
KistaOpen.Net KTH Communication Systems Design 2002.
DIT Campus Network 2G1713 Communication Systems Design, 2004 Department of Microelectronics and Information Technology, KTH Team Members Honoratha Shayo2G1713.
IS3220 Information Technology Infrastructure Security
1 Chapter 2: Wireless LANs and PANs  Introduction  Fundamentals of WLANs  IEEE Standard  HIPERLAN Standard  Bluetooth  HomeRF.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
4G WIRELESS SYSTEM Presented By S. RAVINDER 06U61A0435.
Security Issues With Mobile IP
Wireless Technologies
Security Issues.
Lifecycle Services for Advanced Wireless LAN (LCSAWLAN) practice-questions.html.
CSE 4905 Network Security Overview
Technology, Issues, and Solutions by David Clark
کنکور کارشناسی ارشد 93 مدیریت
Virtual Private Networks
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Configure a Wireless Router
Cengage Learning: Computer Networking from LANs to WANs
Configure a Wireless Router
By Markus Kriechhammer
LM 5. Wireless Network Security
Presentation transcript:

Communication System Design, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars Adolfsson Co-Coach : Fredrik Lilieblad Mehdi Ghasemi Project Manager Windows master HiperLAN Xiaodong Hu Website and documents Bluetooth Yvonne Grunnevall Video presentation IEEE802.11

Communication System Design, KTH2  Goals  What is Wireless Local Area Network?  HiperLAN, IEEE a, b, Bluetooth  What is Wireless Security?  Threats in wireless LAN  Security implementations in those standards  IP-Roaming  SWOT Analyze Presentation disposition Security And Availability For Wireless Communication

Communication System Design, KTH3  Classifying security threats in WLAN  Solutions to the threats  Comparing HiperLAN, and Bluetooth with each other  Seamless IP-Roaming (Current state)  Based on OS explore known security risks with respect to IP (Will work with in the near future) Goals Security And Availability For Wireless Communication

Communication System Design, KTH4 What is WLAN (Wireless Local Area Network) ? Security And Availability For Wireless Communication

Communication System Design, KTH5 HiperLAN/2,IEEE and Bluetooh Security And Availability For Wireless Communication

Communication System Design, KTH6  What is WLAN Security? Security And Availability For Wireless Communication

Communication System Design, KTH7 Threats in Wireless Communication 1.Passive attacks 2.Active attacks Security And Availability For Wireless Communication

Communication System Design, KTH8 Threats in Wireless Communication Passive attacks Eavesdropping (sniffering) Security And Availability For Wireless Communication

Communication System Design, KTH9 Threats in Wireless Communication Active attacks 1.Social Engineering 2.Impersonation 3.Exploits 4.Data Driven 5.Transitive Trust 6.Infrastructure 7.Denial of Service Security And Availability For Wireless Communication Similar in Wired & Wireless Communication

Communication System Design, KTH10  IEEE : WEP (Wired Equivalent privacy) SSID (service set identifiers ) MAC address filtering  Bluetooth: Authorization Authentication Encryption  HiperLAN: Authentication Encryption Security Implementation in HiperLAN, IEEE , Bluetooth Security And Availability For Wireless Communication

Communication System Design, KTH11  Mobile IP  Wireless VPN (Virtual Private Network)  IP Mobility  Session Mobility IP-Roaming Security And Availability For Wireless Communication

Communication System Design, KTH12  Strengths  What to do about this  Weakness  What to do about this  Opportunities  What to do about this  Threats  What to do about this SWOT Analysis Security And Availability For Wireless Communication

Communication System Design, KTH13  Small group  Easy communications  Easy scheduling  Good relationship with our team coach  Are able to work even more and harder  Interest of new technologies Strengths Security And Availability For Wireless Communication

Communication System Design, KTH14 What to do about it?  Utilize the strengths efficiently Security And Availability For Wireless Communication

Communication System Design, KTH15 Weakness  Small group  Much work  No motivation Security And Availability For Wireless Communication

Communication System Design, KTH16 How can we overcome the weakness?  Working more  Being flexible to manage and accepting new tasks  Sharing the tasks equally among the members  Group meeting  Social activities Security And Availability For Wireless Communication

Communication System Design, KTH17  Working with a real-world project  Useful for Swedish government and community  Contacts with companies and authorities  Knowledge about new technique  Knowledge about new cultures Opportunities Security And Availability For Wireless Communication

Communication System Design, KTH18 What to do about it?  Being smart and taking advantages of them Security And Availability For Wireless Communication

Communication System Design, KTH19 Threats  Lack of knowledge  Co-operation difficulties  Not useful technology (hiperlan/2)  Assignments effecting the quality of the project Security And Availability For Wireless Communication

Communication System Design, KTH20 What to do about it?  Being aware of the threats  Meeting with the Principal and the Coach Security And Availability For Wireless Communication

Communication System Design, KTH21 3 things to get from others  Project 1: Internet Scalability Problems with interference from WLAN (802.11, Hiperlan/2)  Project 4: Privacy in IPv6 Mobile IPv6. IPsec  Project 17: (m)IP/(WLAN,GPRS) Roaming in wireless infrastructure Security And Availability For Wireless Communication

Communication System Design, KTH22 3 things to offer to others  WLAN,HiperLAN, Bluetooth Security issues, Weakness and Strength  IP - Roaming Security issues, Wireless VPN, IP Mobility and Session Mobility  Security in wireless VPN Security issues, IP Mobility and Session Mobility Security And Availability For Wireless Communication

Communication System Design, KTH23 Thank you for listening Questions? Security And Availability For Wireless Communication