Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

By Md Emran Mazumder Ottawa University Student no:
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
The study and demonstration on SIP security vulnerabilities Mahidhar Penigi Vamsi Krishna Karnati.
Cryptography and Network Security Chapter 1
Lecture 1: Overview modified from slides of Lawrie Brown.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Centre for Wireless Communications University of Oulu, Finland
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
Introduction (Pendahuluan)  Information Security.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Rajeev Bevara CS-555 Security Threats in VoIP. What is VoIP ? ➔ VOIP - Voice Over Internet Protocol. ➔ Delivery of voice communications and multimedia.
Networks Olga Agnew Bryant Likes Daewon Seo.
SECURITY PROBLEMS PERTAINING TO E-CONTENT INFORMATION FLOW IN WIRELESS MOBILE AD-HOC NETWORKS. P. Balagangadhar Rao INDIA
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Security in MobileIP Fahd Ahmad Saeed. Wireless Domain Problem Wireless domain insecure Data gets broadcasted to everyone, and anyone hearing this can.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Information Security Principles (ESGD4222)
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
8/30/2010CS 686 Definition of Security/Privacy EJ Jung CS 686 Special Topics in CS Privacy and Security.
WEP Protocol Weaknesses and Vulnerabilities
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Lecture 24 Wireless Network Security
Ad Hoc Network.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Security in Wireless Sensor Networks by Toni Farley.
Ingredients of Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Network Security Introduction
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
Computer threats, Attacks and Assets upasana pandit T.E comp.
Network Security Celia Li Computer Science and Engineering York University.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
ENCRYPTION, SSL, CERTIFICATES RACHEL AKISADA & MELANIE KINGSLEY.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Security Issues With Mobile IP
The study and demonstration on SIP security vulnerabilities
Security Of Wireless Sensor Networks
Faculty of Science IT Department By Raz Dara MA.
Security of Wireless Sensor Networks
Computer Security By: Muhammed Anwar.
Security in SDR & cognitive radio
An Overview of Security Issues in Sensor Network
Security Attacks, Mechanisms, and Services
Presentation transcript:

Wireless Network Security

How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium, the air.

Security Concerns  Types of attacks  Passive Attacks  Eavesdropping  Active Attacks  Registration of a Malicious Node  Replay Attack  Denial of Service  Common flooding  Rogue access point  Man in the Middle Attacks  Types of attacks  Passive Attacks  Eavesdropping  Active Attacks  Registration of a Malicious Node  Replay Attack  Denial of Service  Common flooding  Rogue access point  Man in the Middle Attacks

Goals  Availability  Require network assets are available when needed and ensure the survivability of the network services despite DOS attacks  Confidentiality  Ensure that certain information is never disclosed to unauthorized entities  Routing information must also remain secure  Integrity  Guarantees that the information being transferred is never altered  Availability  Require network assets are available when needed and ensure the survivability of the network services despite DOS attacks  Confidentiality  Ensure that certain information is never disclosed to unauthorized entities  Routing information must also remain secure  Integrity  Guarantees that the information being transferred is never altered

Challenges  Attacks can come from all directions and target any node  Damage can include leaking secret information, interfering message delivery and impersonating nodes  Have inadequate physical protection and therefore the network can be more easily compromised  Attacks can come from all directions and target any node  Damage can include leaking secret information, interfering message delivery and impersonating nodes  Have inadequate physical protection and therefore the network can be more easily compromised

Solutions  MD5 with 128-bit encryption  Keeps information confidential  With a shared random number prevents replay attacks  Prevent unauthorized access using MAC filtering  Physical security  Secure the building and shield it from outside interference  MD5 with 128-bit encryption  Keeps information confidential  With a shared random number prevents replay attacks  Prevent unauthorized access using MAC filtering  Physical security  Secure the building and shield it from outside interference