University of Kansas Motivation Wireless networks based on the IEEE 802.11 standard require lengthy layer two configuration parameters to be set SSID (Network.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
1 Computer Networks IP: The Internet Protocol. 2 IP is a connection-less, unreliable network layer protocol IP provides best effort services in the sense.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
& WEP Tzachy Reinman System and Network Security Course
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
CS335 Networking & Network Administration Tuesday, April 13, 2010.
DSL ADSL Protocols Security Wi-Fi Cable vs ADSL
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Security and Wireless LANs Or Fun and Profit With Your Neighbor’s Bandwidth Chris Murphy MIT Information Systems.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
WLAN What is WLAN? Physical vs. Wireless LAN
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
CSC 412 – Networking Scott Heggen. Agenda Today The Network Layer (Chapter 5) Discussion on A2: The Data Link Layer Thursday Q2: The Networking Layer.
Ch. 5 – Access Points. Overview Access Point Connection.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
Wireless Networks Tamus, Zoltán Ádám
CWNA Guide to Wireless LANs, Second Edition
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Connecting The Network Layer to Data Link Layer. ARP in the IP Layer The Address Resolution Protocol (ARP) The Address Resolution Protocol (ARP) Part.
Wireless Encryption: WEP and cracking it. Eric Shea.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Setting Wireless Network At Home By: Parveen Sharma.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Encryption Protocols used in Wireless Networks Derrick Grooms.
Solving the Security Risks of WLAN Tuukka Karvonen
Mozafar Bag-Mohammadi University of Ilam
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Network Components Kortney Horton LTEC October 20, 2013 Assignment 3.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
NETWORKING COMPONENTS Jeffery Rice LTEC Assignment 3.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
How to Use LINCWorks as a Wireless Repeater For additional help please contact: Paul Peterson
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Instructor Materials Chapter 6 Building a Home Network
Wireless Mesh Networks
CSE 4905 Network Security Overview
Ethernet : Framing and Addressing
Computing Over Distance
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
Mozafar Bag-Mohammadi University of Ilam
Presentation transcript:

University of Kansas Motivation Wireless networks based on the IEEE standard require lengthy layer two configuration parameters to be set SSID (Network Name) WEP Encryption Keys Embedded devices with limited input capabilities are unable to join the wireless network until properly configured Traditional layer three configurations protocols like DHCP can be utilized once data layer communication is established

University of Kansas Encapsulation headers are unencrypted Access Points copy MAC addresses during the bridging process Data portion encrypted –No use to a station without keys Source address - 6 octets of data Broadcast

University of Kansas Wi-Fi-Co Protocol The Configurator host sends wireless network parameters to an embedded device via broadcast packets Configuration data is embedded in the source MAC address A Wi-Fi station is able to capture the configuration frames and assemble the data from the cleartext headers

University of Kansas Wi-Fi-Co Timing Diagram Configurator constantly broadcasts configuration data in fragmented packets The target assembles configuration data and decodes link level parameters Must “hop” Wi-Fi channels to guarantee that configuration data will be received

University of Kansas Protecting WEP Keys Broadcast packets easily intercepted On wired Ethernet network portion On wireless network portion Configuration data Encrypted Shared key symmetric cipher Embedded devices ship with unique, pre-programmed key Certificate with product code Additional input required on the Configuration host where it is much easier than input to embedded device

University of Kansas Applications