Communication System Design 2002, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars.

Slides:



Advertisements
Similar presentations
Wireless LAN Security Mandy Andress ArcSec Technologies Black Hat Briefings July 12, 2001.
Advertisements

1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wired Equivalent Privacy (WEP)
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
Networks Olga Agnew Bryant Likes Daewon Seo.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WLAN What is WLAN? Physical vs. Wireless LAN
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Communication System Design, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars Adolfsson.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
A History of WEP The Ups and Downs of Wireless Security.
Wireless Networks Tamus, Zoltán Ádám
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
A PRESENTATION ON “Wireless Networks”
WEP Protocol Weaknesses and Vulnerabilities
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Wi-Fi Technology.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
WLAN Security1 Security of WLAN Máté Szalay
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Understand Wireless Security LESSON Security Fundamentals.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Instructor Materials Chapter 6 Building a Home Network
CSE 4905 Network Security Overview
Wireless Security Ian Bodley.
Wireless LAN Security 4.3 Wireless LAN Security.
Mandy Andress ArcSec Technologies
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Presentation transcript:

Communication System Design 2002, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars Adolfsson Co-Coach : Fredrik Lilieblad Mehdi GhasemiXiaodong HuYvonne Grunnevall

Communication System Design 2002, KTH2  Goals  What is Wireless Security?  Threats in wireless LAN  Security implementations in  HiperLAN/2, IEEE a, b and Bluetooth  IP-Roaming (WVPN)  OS security  Conclusion Presentation disposition Security And Availability For Wireless Communication

Communication System Design 2002, KTH3  Classifying security threats in WLAN  Security implementation in HiperLAN/2, and Bluettoth  Comparing HiperLAN, and Bluetooth with each other  Seamless IP-Roaming  Security solutions  Inventory of terminals on the market Goals Security And Availability For Wireless Communication

Communication System Design 2002, KTH4 What is WLAN Security? Security And Availability For Wireless Communication

Communication System Design 2002, KTH5 Threats in Wireless Communication 1.Passive attacks 2.Active attacks Security And Availability For Wireless Communication

Communication System Design 2002, KTH6 Threats in Wireless Communication Passive attacks Eavesdropping (sniffering)  Very easy in the radio environment.  If the wireless LAN is inside a building, the eavesdropping could actually occur from an external point Security And Availability For Wireless Communication

Communication System Design 2002, KTH7 Threats in Wireless Communication Active attacks 1.Social Engineering 2.Impersonation 3.Exploits 4.Data Driven 5.Transitive Trust 6.Infrastructure 7.Denial of Service Security And Availability For Wireless Communication Similar in Wired & Wireless Communication

Communication System Design 2002, KTH8 Threats in Wireless Communication Social Engineering  Fooling the victim for fun and profit  Example 1.Please change your password to ”fooble” 2.Attacker then logs in as user from our network 3. System bugs exploited to gain complete run of system Security And Availability For Wireless Communication

Communication System Design 2002, KTH9 Threats in Wireless Communication Impersonation  Stealing access rights of authorized users  Example 1.Attacker with network sniffer (tcpdump,nitsniff, etc) at trade show or network captures complete login session 2.Attacker later logs into system with user-id and stolen password Security And Availability For Wireless Communication

Communication System Design 2002, KTH10 Threats in Wireless Communication Exploits  Exploiting a hole in software or operatingsystems  Example 1.Attacker sends a message to invalid recipient that appears to have come from a program invocation Security And Availability For Wireless Communication

Communication System Design 2002, KTH11 Threats in Wireless Communication Data Driven  Trojans, trapdoors, viruses  Example 1.Attacker logs into user's account Security And Availability For Wireless Communication

Communication System Design 2002, KTH12 Threats in Wireless Communication Transitive Trust  Attacker fools the mobile host into trusting a base station controlled by the attacker  Wireless LANs offer an interface to an attacker requiring no physical arrangements Security And Availability For Wireless Communication

Communication System Design 2002, KTH13 Threats in Wireless Communication Infrastructure  Taking advantage of protocol or infrastructure features or bugs  Infrastructure attacks are based on weaknesses in the system; software bugs, configuration mistakes, hardware failures, etc.  Similar to problems in wired LANS.  Protection against this type of attacks is nearly impossible. Efforts should be made to minimize potential damage. Security And Availability For Wireless Communication

Communication System Design 2002, KTH14 Threats in Wireless Communication Denial of Service  Preventing system from being used  As result of the nature of radio transmissions, wireless LANs are very vulnerable to DOS attacks  With a powerful enough transceiver, an attacker can easily generate enough interference to jam communications Security And Availability For Wireless Communication

Communication System Design 2002, KTH15 Security Implementation in  IEEE  HiperLAN  Bluetooth Security And Availability For Wireless Communication

Communication System Design 2002, KTH16 Security And Availability For Wireless Communication : Wired Equivalent Privacy (WEP)  Designed to be computationally efficient, self-synchronizing and exportable  All users of a given access point share the same encryption key  Shared key authentication  Vulnerable to attack  Data headers remain unencrypted so anyone can see the source and destination of the data stream

Communication System Design 2002, KTH17 Security And Availability For Wireless Communication : Service Set ID (SSID)  SSID is the network name for a wireless network  Can be required to specifically request the access point by name (lets SSID act as a password)  The more people that know the SSID, the higher risks for misuse  Changing the SSID requires communicating the change to all users of the network

Communication System Design 2002, KTH18 Security And Availability For Wireless Communication : MAC Address  Can control access by allowing only defined MAC addresses to connect to the network  Must compile, maintain, and distribute a list of valid MAC addresses to each access point  This address can be spoofed  Not a valid solution for public applications

Communication System Design 2002, KTH19 Bluetooth Security And Availability For Wireless Communication  Three security modes 1. Non-secure 2. Link level security, four entities 3. Service levle security, three security levels

Communication System Design 2002, KTH20 HiperLAN/2 Security And Availability For Wireless Communication  Authentication  Pre-shared key  Public key  Encryption

Communication System Design 2002, KTH21 Security And Availability For Wireless Communication Feature802.11a802.11bHiperLAN/2 Access CSMA/CA Centralized TDMA Connection Connectionless Connection oriented Network support Support for based network Support for multiple core network Encryption 40-bit RC4 DES, 3DES Security Authentication, encryption and WEP (and OFDM ) Authentication encryption and WEP Defines two IDs of communicating nodes uniquely identifying any stations to accomplish security Comparison between the standards

Communication System Design 2002, KTH22 Security And Availability For Wireless Communication  a and b work on different frequencies, so Can coexist in one network  Interference between b and Bluetooth (near each other)  HiperLAN/2 is not interoperable with a or b Interoperability

Communication System Design 2002, KTH23 Security And Availability For Wireless Communication  Security and seamless IP-Roaming  IP Mobility  Session Mobility Wireless VPN

Communication System Design 2002, KTH24 IP Mobility Security And Availability For Wireless Communication

Communication System Design 2002, KTH25 Security And Availability For Wireless Communication Session Mobility

Communication System Design 2002, KTH26 Security And Availability For Wireless Communication OS Security

Communication System Design 2002, KTH27 Security And Availability For Wireless Communication Windows Security

Communication System Design 2002, KTH28 Security And Availability For Wireless Communication Unix security

Communication System Design 2002, KTH29 Security And Availability For Wireless Communication  Wireless LANs very useful and convenient, but current security state not ideal for sensitive environments.  Growing use and popularity require increased focus on security  Cannot forget client security  Strong end user security policies and configurations  The nature of the radio communication makes it practically impossible to prevent some attacks, like denial of service using radio interference  Firewalls  Wireless VPN Conclusion

Communication System Design 2002, KTH30 Questions? Security And Availability For Wireless Communication

Communication System Design 2002, KTH31 What is WLAN (Wireless Local Area Network) ? Security And Availability For Wireless Communication

Communication System Design 2002, KTH32 HiperLAN/2,IEEE and Bluetooh Security And Availability For Wireless Communication

Communication System Design 2002, KTH33 IP-Roaming Security And Availability For Wireless Communication

Communication System Design 2002, KTH34 Security And Availability For Wireless Communication  2.4GHz operating frequency  1 to 2 Mbps throughput  Can choose between frequency hopping or direct sequence spread modulation

Communication System Design 2002, KTH35 Security And Availability For Wireless Communication  Operates in 5GHz band (less RF interference than 2.4GHz range)  Users Orthogonal Frequency Division Multiplexing (OFDM)  Supports data rates up to 54 Mbps  Currently no products available, expected in fourth quarter a

Communication System Design 2002, KTH36 Security And Availability For Wireless Communication  Operates in 2.4GHz band  Data rates can be as high as 11 Mbps  Only direct sequence modulation is specified  Most widely deployed today b

Communication System Design 2002, KTH37 Security And Availability For Wireless Communication  Development led by the European Telecommunications Standards Institute (ETSI)  Operates in the 5 GHz range, uses OFDM technology, and support data rates over 50Mbps like a  QoS HiperLAN/2

Communication System Design 2002, KTH38 Security And Availability For Wireless Communication  Provides a scaleable authentication and encryption solution  Does require end user configuration and a strong knowledge of VPN technology  Users must re-authenticate if roaming between VPN servers VPN (Virtual Private Network)

Communication System Design 2002, KTH39 Security And Availability For Wireless Communication WEP Encapsulation Summary: Encryption Algorithm = RC4 Per-packet encryption key = 24-bit IV concatenated to a pre-shared key WEP allows IV to be reused with any frame Data integrity provided by CRC-32 of the plaintext data (the “ICV”) Data and ICV are encrypted under the per-packet encryption key HdrData HdrDataIVICV EncapsulateDecapsulate WEP Encapsulation

Communication System Design 2002, KTH40 Difference between HiperLAN/2 and Security And Availability For Wireless Communication  Higher efficiency with regard to throughput  Main difference is at MAC-layer  Can be used in a vriouse core network envoironment

Communication System Design 2002, KTH41 Security And Availability For Wireless Communication Vulnerability