Wireless and Instant Messaging

Slides:



Advertisements
Similar presentations
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
Advertisements

LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Wireless networking technology By Abbas Izadpanah January 2007.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
CPET 260 – Network I Wireless Networks Bluetooth.
Access Control and Site Security (Part 2) (Tuesday, January 22, 2008) © Abdou Illia – Spring 2008.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
CIST 1601 Information Security Fundamentals Chapter 12 Wireless Networking Security Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft.
Network and Internet Security
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
WLAN What is WLAN? Physical vs. Wireless LAN
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Wireless Security Chapter 12.
Access Control and Site Security (Part 2) (January 28, 2015) © Abdou Illia – Spring 2015.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Chapter 11: Wireless LANs Business Data Communications, 6e.
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Networking.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Chapter 8 Connecting Wirelessly
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Presented by: Dr. Munam Ali Shah
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
A PRESENTATION ON “Wireless Networks”
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Wireless Technologies Chapter 9. Learning Objectives Explain current wireless networking technologies Discuss history of wireless networks and their advantages.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security Standards. IEEE IEEE 802 committee for LAN standards IEEE formed in 1990’s – charter to develop a protocol & transmission specifications.
1 LAN – local area network overview: 1.Types of networks 2.Network topology 3.LAN local area networks 4.Introduction to TCP/IP 5.IEEE / Wireless.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Solving the Security Risks of WLAN Tuukka Karvonen
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Wireless and Instant Messaging Katherine Morris
Chapter-7 Basic Wireless Concepts and Configuration.
Instructor Materials Chapter 6 Building a Home Network
WLAN Security Antti Miettinen.
Wireless and Instant Messaging
Antti Miettinen (modified by JJ)
Presentation transcript:

Wireless and Instant Messaging Chapter 8

Learning Objectives Understand security issues related to wireless data transfer Understand the 802.11x standards Understand Wireless Application Protocol (WAP) and how it works Understand Wireless Transport Layer Security (WTLS) protocol and how it works continued…

Learning Objectives Understand Wired Equivalent Privacy (WEP) and how it works Conduct a wireless site survey Understand instant messaging

802.11 IEEE group responsible for defining interface between wireless clients and their network access points in wireless LANs First standard finalized in 1997 defined three types of transmission at Physical layer Diffused infrared - based on infrared transmissions Direct sequence spread spectrum (DSSS) - radio-based Frequency hopping spread spectrum (FHSS) - radio-based continued…

802.11 Established WEP as optional security protocol Specified use of 2.4 GHz industrial, scientific, and medical (ISM) radio band Mandated 1 Mbps data transfer rate and optional 2 Mbps data transfer rate Most prominent working groups: 802.11b, 802.11a, 802.11i, and 802.11g

802.11a “High-Speed Physical Layer in the 5 GHz Band” Sets specifications for wireless data transmission of up to 54 Mbps in the 5 GHz band Uses an orthogonal frequency division multiplexing encoding scheme rather than FHSS or DSSS Approved in 1999

802.11b “Higher-Speed Layer Extension in the 2.4 GHz Band” Establishes specifications for data transmission that provides 11 Mbps transmission (with fallback to 5.5, 2, and 1 Mbps) at 2.4 GHz band Sometimes referred to as “Wi-Fi” when associated with WECA certified devices Uses only DSSS Approved in 1999

802.11c Worked to establish MAC bridging functionality for 802.11 to operate in other countries Folded into 802.1D standard for MAC bridging

802.11d Responsible for determining requirements necessary for 802.11 to operate in other countries Continuing

802.11e Responsible for creating a standard that will add multimedia and quality of service (QoS) capabilities to wireless MAC layer and therefore guarantee specified data transmission rates and error percentages Proposal in draft form

802.11f Responsible for creating a standard that will allow for better roaming between multivendor access points and distribution systems Ongoing

802.11g Responsible for providing raw data throughput over wireless networks at a throughput rate of 22 Mbps or more Draft created in January 2002; final approval expected in late 2002 or early 2003

802.11h Responsible for providing a way to allow for European implementation requests regarding the 5 GHz band Requirements Limits PC card from emitting more radio signal than needed Allows devices to listen to radio wave activity before picking a channel on which to broadcast Ongoing; not yet approved

802.11i Responsible for fixing security flaws in WEP and 802.1x Hopes to eliminate WEP altogether and replace it with Temporal Key Integrity Protocol (TKIP), which would require replacement of keys within a certain amount of time Ongoing; not yet approved

802.11j Worked to create a global standard in the 5 GHz band by making high-performance LAN (HiperLAN) and 802.11a interoperable Disbanded after efforts in this area were mostly successful

Wireless Application Protocol (WAP) Open, global specification created by the WAP Forum Designed to deliver information and services to users of handheld digital devices Compatible with most wireless networks Can be built on any operating system

WAP-Enabled Devices

WAP-Enabled Devices

How WAP 1x Works WAP 1.x Stack Set of protocols created by the WAP Forum that alters the OSI model Five layers lie within the top four (of seven) layers of the OSI model Leaner than the OSI model Each WAP protocol makes data transactions as compressed as possible and allows for more dropped packets than OSI model

WAP 1.x Stack Compared to OSI/Web Stack

Differences Between Wireless and Wired Data Transfer WAP 1.x stack protocols require that data communications between clients (wireless devices) and servers pass through a WAP gateway Network architectural structures

WAP versus Wired Network

The WAP 2.0 Stack Eliminates use of WTLS; relies on a lighter version of TLS – the same protocol used on the common Internet stack – which allows end-to-end security and avoids any WAP gaps Replaces all other layers of WAP 1.x by standard Internet layers Still supports the WAP 1.x stack in order to facilitate legacy devices and systems

Additional WAP 2.0 Features WAP Push User agent profile Wireless Telephony Application Extended Functionality Interface (EFI) Multimedia Messaging Service (MMS)

Wireless Transport Layer Security (WTLS) Protocol Provides authentication, data encryption, and privacy for WAP 1.x users Three classes of authentication Class 1 Anonymous; does not allow either the client or the gateway to authenticate each other Class 2 Only allows the client to authenticate the gateway Class 3 Allows both the client and the gateway to authenticate each other

WTLS Protocol: Steps of Class 2 Authentication WAP device sends request for authentication Gateway responds, then sends a copy of its certificate – which contains gateway’s public key – to the WAP device WAP device receives the certificate and public key and generates a unique random value WAP gateway receives encrypted value and uses its own private key to decrypt it

WTLS Security Concerns Security threats posed by WAP gap Unsafe use of service set identifiers (SSIDs)

Wired Equivalent Privacy (WEP) Optional security protocol for wireless local area networks defined in the 802.11b standard Designed to provide same level of security as a wired LAN Not considered adequate security without also implementing a separate authentication process and providing for external key management

Wireless LAN (WLAN) Connects clients to network resources using radio signals to pass data through the ether Employs wireless access points (AP) Connected to the wired LAN Act as radio broadcast stations that transmit data to clients equipped with wireless network interface cards (NICs)

How a WLAN Works

APs

NICs

How WEP Works Uses a symmetric key (shared key) to authenticate wireless devices (not wireless device users) and to guarantee integrity of data by encrypting transmissions Each of the APs and clients need to share the same key Client sends a request to the AP asking for permission to access the wired network continued…

How WEP Works If WEP has not been enabled (default), the AP allows the request to pass If WEP has been enabled, client begins a challenge-and-response authentication process

WEP’s Weaknesses Problems related to the initialization vector (IV) that it uses to encrypt data and ensure its integrity Can be picked up by hackers Is reused on a regular basis Problems with how it handles keys

Other WLAN Security Loopholes War driving Unauthorized users can attach themselves to WLANs and use their resources, set up their own access points and jam the network WEP authenticates clients, not users Wireless network administrators and users must be educated about inherent insecurity of wireless systems and the need for care

Conducting a Wireless Site Survey Conduct a needs assessment of network users Obtain a copy of the site’s blueprint Do a walk-through of the site Identify possible access point locations Verify access point locations Document findings

Instant Messaging (IM) AOL Instant Messenger (AIM) MSN Messenger Yahoo! Messenger ICQ Internet Relay Chat (IRC)

Definition of IM Uses a real-time communication model Allows users to keep track of online status and availability of other users who are also using IM applications Can be used on both wired and wireless devices Easy and fast continued…

Definition of IM Operates in two models: Peer-to-peer model May cause client to expose sensitive information Peer-to-network model Risk of network outage and DoS attacks making IM communication unavailable

Problems Facing IM Lack of default encryption enables packet sniffing Social engineering overcomes even encryption

Technical Issues Surrounding IM Files transfers Application sharing

Legal Issues Surrounding IM Possible threat of litigation or criminal indictment should the wrong message be sent or overheard by the wrong person Currently immune to most corporate efforts to control it Must be monitored in real time

Blocking IM Install a firewall to block ports that IM products use; IM will be unavailable to all employees Limited blocking not currently possible

Cellular Phone Simple Messaging Service (SMS) Messages are typed and sent immediately Problems Tracking inappropriate messages Risk of having messages sniffed

Chapter Summary Efforts of IEEE, specifically 802.11x standards, to standardize wireless security Security issues related to dominant wireless protocols WAP Connects mobile telephones, PDAs, pocket computers, and other mobile devices to the Internet WEP Used in WLANs continued…

Chapter Summary WTLS protocol Conducting a site survey in advance of building a WLAN Security threats related to using (IM)