A Study of the Geographic Spread and Security of Wireless Access Points Stuart Cunningham & Vic Grout Centre for Applied Internet Research (CAIR) University.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
Wireless LAN Security Understanding and Preventing Network Attacks.
SMC2804WBRP-G Barricade™ g 2.4GHz 54Mbps Wireless Cable/DSL Broadband Router with USB Print Server SMC2804WBRP-G
Ants in the Internet! (or ‘ Working together works best ’ ) Nigel Houlden & Vic Grout Centre for Applied Internet Research (CAIR) North East Wales Institute.
ACCURACY CHARACTERIZATION FOR METROPOLITAN-SCALE WI-FI LOCALIZATION Presented by Jack Li March 5, 2009.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wardriving 7/29/2004 The “Bad Karma Gang”. Agenda Introduction to Wardriving The Tools of Wardriving Wardriving Green Lake.
Wireless networking Roger Treweek Oxford University Computing Services.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
Visualization of Wireless Computer Networks Dunbar, Matt D., Kansas Applied Remote Sensing Program and University of Kansas Geography Department, and Becker,
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
WiMAX Vs Wi-Fi. 2 WiMAX Worldwide Interoperability for Microwave Access Brand licensed by the WiMax Forum. “a standards-based technology enabling the.
TAX-AIDE Local Area Networking July, 2013.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
A Measurement Study of Vehicular Internet Access Using In Situ Wi-Fi Networks Vladimir Bychkovsky, Bret Hull, Allen Miu, Hari Balakrishnan, and Samuel.
Internet Traffic Policies and Routing Vic Grout Centre for Applied Internet Research (CAIR) University of Wales NEWI Plas Coch Campus, Mold Road Wrexham,
Topic Coverage – Consumer Why Wireless? Advantages of Wireless How Does Wireless Work – Consumer? Various Types x – A vs. B vs. G Which is best for.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Wi-Fi Public Access Requirements for Wireless Products & Technologies Public Access Provider Perspective Phil Belanger.
Chapter 8 Connecting Wirelessly
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Real-Time Network Optimisation Vic Grout Centre for Applied Internet Research (CAIR) University of Wales NEWI Plas Coch Campus, Mold Road Wrexham, LL11.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Mathematical Programming for Optimisation Mike Morgan and Vic Grout Centre for Applied Internet Research (CAIR) University of Wales NEWI Plas Coch Campus,
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Peter Peerdeman Introduction Overview Wireless security Fon network Security scenarios Conclusion Wireless security Fon network Security.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Wireless 101 Brian Heil Consultant, Ezrasoft Consulting & Design.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Network Components By: Zach Przybilla CECS 5460 Fall 2015.
PwC Making Wireless Networks Secure Computerworld 30 Nov 2004 Mark Vos.
August 27, 2003 Evaluation of WiNc Manager A Wireless Network Management Software from Cirond Technologies Inc. by Kassim Olawale Radio Science Laboratory.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
Submitted By:- Raushan Kr. Chaurasiya(68) Santu Thapa(75) Satyanarayan Prajapat(76)
Securing a Wireless Home Network BY: ARGA PRIBADI.
Wireless Gateway Name : Ahmad Rafiq Bin Razif Matrix Num :
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
4G Wireless Technology Prepared by K.Sai Kumar Yadav 07K81A0584.
TSS 3293 W IRELESS N ETWORK SECURITY AIMAN ALIF BIN SUPIAN TSK WIRELESS GATEWAY.
INTRODUCTION WIRELESS GATEWAY.  A device that allows a computer and other Internet-enabled devices to access the Internet connection.  Functioned as.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
Doc.: wng Submission - Study Project Proposal WPP - Introduction November 2003 Pratik Mehta, Dell Inc.Slide 1 IEEE WNG Study Project.
Wireless Network Visualization using Radio Propagation Modelling Johanna Janse van Rensburg Supervisor: Barry Irwin.
(Worldwide Interoperability for Microwave Access)
Wireless Security By: Bryan M Keller.
A. Sebbar, SE. Boulahya, G. Mezzour, M. Boulmalf
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Security in Networking
2018 Real CompTIA N Exam Questions Killtest
Wi-Fi Technology.
LM 5. Wireless Network Security
Presentation transcript:

A Study of the Geographic Spread and Security of Wireless Access Points Stuart Cunningham & Vic Grout Centre for Applied Internet Research (CAIR) University of Wales, NEWI Plas Coch Campus, Mold Road, Wrexham, LL11 2AW, UK NEWI North East Wales Institute of Higher Education - Centre for Applied Internet Research

Introduction Large uptake of Wi-Fi Home (especially significant) Business / Industry Academic … everywhere! Increased scope for research Service utilisation Roaming Behavioural studies

Wi-Fi Studies: Security Less work done in determining implementation of secure services Nature of wireless means physical boundaries are (almost) insignificant Given large uptake, especially of non- technical, home users, poses questions: Just how big is the Wi-Fi uptake? What is the uptake / awareness of security? Are there any differences between areas?

Real-World Case Study 16km 2 representative area Residential, industrial, commercial sectors Equipment GPS to fix locations Wi-Fi enabled laptop Coverage of area via road network Carried out during ‘ working hours ’ ~10 hours total to cover area Detection of Access Points Secure and non-secure

Real-World Case Study Reflection of ‘ war driving ’ scenario ‘ Parking Lot Attack ’ (Arbaugh et al., 2002)

Mapping Results 1153 Access Points detected

Mapping Results (Secure Vs. Unsecure) Security Secure WAPs891 (77%) Unsecure WAPs262 (23%) Data Rates 54 Mbps1027 (89%) 11 Mbps126 (11%) Total WAPs1153

Cluster Analysis Attempt to identify any correlation between ‘ areas ’ and groups of Access Points Cluster# APs Red ● 308 (26.71%) Blue ● 561 (48.66%) Green ● 284 (24.63%) 3 clusters don ’ t identify areas in this case …

Cluster Analysis Cluster# APs Blue ● 418 (36.25%) Purple ● 288 (24.98%) Green ● 268 (23.24%) Red ● 179 (15.52%) Attempt to identify any correlation between ‘ areas ’ and groups of Access Points Broad identification achieved

Discussion of Results Majority of APs are secure (77%) Notional study in 2002 revealed ~66% unsecure (Ward, 2002) Still, almost a quarter not secure(!) Similar spread across area Large uptake within residential zones 89% using IEEE g (rest b) Clustering useful in zone identification High number of residential vs. other areas skew results Beyond 4 clusters proved ineffective

Security Indexing (ongoing work) Requires formal zone definition (Z 1, Z 2, …, Z m ) Recognition of Access Point a within a Zone (a  Z) Denote, by A j, set, {a : a  Zj }, of access points in zone Z j. For any set of access points, A, denote the set of secure points by S(A) and the set of unsecure points by U(A). Can then calculate security index, SI j, for zone Z j as:

Security Indexing (ongoing work) Then require scoring or ordering from features Of the Zone: Level of industrial activity, property value, etc. Or of the access points: Density, type, etc. Each such scoring or ordering will give a value, V j or rank, R j, for each zone, Z j Calculating coefficients of correlation or rank correlation across zones will show different levels of dependence between features

Security Configuration Physically Reducing threats Antenna positioning Aerial Footprint Not always practical / suitable … Software-based WEP Encryption Shown to have shortcomings (Arbaugh et al., 2002) Wi-Fi Protected Access (WPA) Smart cards, USB and software tokens Hiding SSID ACL ’ s based on MAC or IP addresses Hybrid mixtures of techniques is more robust Revisions to IEEE standards pertinent Omni-directionalUni-directional

Conclusions & Future Work Large uptake of Wi-Fi Awareness of security Reflection of zones / communities Data collection Mapping limited by road network Biased GPS accuracy Areas with no road access Future Work How to optimise data collection in future? (Route Inspection Problem) More detailed detection mechanisms Comparisons with other regions

Thank you … … Any questions? NEWI North East Wales Institute of Higher Education - Centre for Applied Internet Research Stuart Cunningham & Vic Grout Centre for Applied Internet Research (CAIR) University of Wales, NEWI Plas Coch Campus, Mold Road, Wrexham, LL11 2AW, UK