Lecture 11 Wireless security

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
IEEE Overview Mustafa Ergen UC Berkeley
Wireless Fidelity.  Short for wireless fidelity.  It is a wireless technology that uses radio frequency to transmit data through the air.  Wi-Fi is.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
WiMAX Introduction Worldwide Interoperability for Microwave Access
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
& WEP Tzachy Reinman System and Network Security Course
Wireless Fidelity (Wi-Fi)
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Networks Olga Agnew Bryant Likes Daewon Seo.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Northeastern Illinois University. Authors Salwa Abdelrahim Samia Nur Eldayim Supervisor Prof. Cafatori.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Networking.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
WiFi Vs. 3G Dikutip dari karya: Anthony Ikemefuna President & co-founder Cellynk Communications Corporation
Chapter 8 Connecting Wirelessly
Sybex CCNA Chapter 12: Wireless Networks.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
WEP Protocol Weaknesses and Vulnerabilities
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Wi-Fi Technology.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Lecture 24 Wireless Network Security
BZUpages.com “In the name of ALLAH, most Beneficent and Merciful”
IWD2243 Wireless & Mobile Security Chapter 1 : Wireless Fundamentals Prepared by : Zuraidy Adnan, FITM UNISEL1.
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
IEEE Wireless LAN Standard
Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wireless LAN Concepts. Wireless LAN Standards.
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
TSS 3293 W IRELESS N ETWORK SECURITY AIMAN ALIF BIN SUPIAN TSK WIRELESS GATEWAY.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Wireless Technologies
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless LAN Security 4.3 Wireless LAN Security.
Wi-Fi Technology.
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
Presentation transcript:

Lecture 11 Wireless security

Wireless Networks Standard Wireless networks are standardized by IEEE. Under 802 LAN MAN standards committee. Application Presentation Session IEEE 802 standards Transport Same organization that came up with IEEE 802.3 Ethernet, which is responsible for success of Internet Network Logical Link Control Data Link Medium Access (MAC) Physical Physical (PHY) ISO - OSI

DSSS Direct Sequence Signaling (DSSS) Using one of 11 overlapping 22MHz channels, multiply the data by an 11-bit number to spread the 1M-symbol/sec data over 11MHz. It use the 2.4 GHz band Requires RF linearity over 11MHz Spreading yields processing gain at receiver Less immune to interference

IEEE 802.11g Introduced in 2003 Combine the feature of both standards (a,b) 100-150 feet range 54 Mbps Speed 2.4 GHz radio frequencies Compatible with ‘b’

Comparison 3G versus WiFi Standard WCDMA,CDMA2000 IEEE 802.11 Max Speed 2 Mbps 54 Mbps Operations Cell phone companies Individuals, WISP License Yes No Coverage Area Several km About 100m Advantages Range, mobility Speed, cheap Disadvantages Relatively slow Expensive Short range

Comparison 3G versus WiMax Wi-Max (Wider-Fi) Standard WCDMA,CDMA2000 IEEE 802.16 Max Speed 2 Mbps 10 to 100 Mbps Operations Cell phone companies Individuals, WISP License Yes Yes/No Coverage Area Several km Advantages Range, mobility Speed, long range Disadvantages Relatively slow Expensive Interference issues?

MITM Attack Attacker spoofes a disassociate message from the victim The victim starts to look for a new access point, and the attacker advertises his own AP on a different channel, using the real AP’s MAC address The attacker connects to the real AP using victim’s MAC address

WEP vs WPA vs WPA2 WEP WPA WPA2 Cript RC4 AES Key rotation None Dynamic session keys Key distribution Manual inert over each device Automatic distribution is possible Authentification Use WEP key 802.1x & EAP supported

Authentification (802.1x / EAP) EAP - Extensible Authentication Protocol 802.1X parte din 802.11i Must certify the user not only the devices Mutual authentification 802.1x authentification Key management EAP Model Addition to the Wi-Fi Protected Access. Used in internal network. Extra security for enterprise and government Wi-Fi LANs. Several versions available.

802.1x

802.1x Access Control Designed as a general purpose network access control mechanism Not Wi-Fi specific Authenticate each client connected to AP (for WLAN) or switch port (for Ethernet) Authentication is done with the RADIUS server, which ”tells” the access point whether access to controlled ports should be allowed or not AP forces the user into an unauthorized state user send an EAP start message AP return an EAP message requesting the user’s identity Identity send by user is then forwared to the authentication server by AP Authentication server authenticate user and return an accept or reject message back to the AP If accept message is return, the AP changes the client’s state to authorized and normal traffic flows

WLAN security methods comparision Security type Security level Install & maintenance Integration & easiest to use WEP Static Low High IEEE 802.1X PEAP Midle IEEE 802.1x TLS

References Mustafa Ergen, IEEE 802.11 Overview, http://wow.eecs.berkeley.edu/ergen/docs/IEEE-802.11overview.ppt Greg Goldman, Is for “Wireless Fidelity” or IEEE 802.11 Standard, http://www.khirman.com/files/image/ppt/WiFi.ppt tcil-india.com/new/new.../TCIL%2010%20WiFi %20Technology.ppt

No wireless is 100% secure!