Dependability in Wireless Networks By Mohammed Al-Ghamdi.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
1 Pertemuan 17 Jaringan LAN (Local Area Network) Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
WiMAX CS441 Dr. Kemal Akkaya 12/8/2011 By: Chun-Cheng Chuang.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
WiMAX Introduction Worldwide Interoperability for Microwave Access
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
& WEP Tzachy Reinman System and Network Security Course
specifications overview Specifications MAC  Specification of layers below LLC  Associated management/control interfaces MIB Control Applications.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless Local Area Networks (WLAN)
WLAN b a Johan Montelius
Networks Olga Agnew Bryant Likes Daewon Seo.
Security and Wireless LANs Or Fun and Profit With Your Neighbor’s Bandwidth Chris Murphy MIT Information Systems.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Network Access Introduction to Networks.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Wireless Local Area Technology.  Garikayi Brasington Madzudzo  Edmund Nartey  Ismeil Ahamed  Jakub Gieryn  Arnaud Fogno.
ZigBee.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Lecture #2 Chapter 14 Wireless LANs.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Communication System Design 2002, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Wi-Fi Jason Orgill John Bodily Scott Rowberry. 2 Background Purpose Develop MAC and PHY layer for wireless connectivity of fixed, portable and moving.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Wireless Technologies Chapter 9. Learning Objectives Explain current wireless networking technologies Discuss history of wireless networks and their advantages.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards Modified.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Chapter 15 Wireless LANs 15.# 1
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
6: Wireless and Mobile Networks6-1 hub or switch AP 2 AP 1 H1 BBS 2 BBS : mobility within same subnet router r H1 remains in same IP subnet: IP.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN Standard
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Wi-Fi Technology.
Chapter 15 Wireless LANs.
Wireless Technologies
Wireless Technologies
Security and Wireless LANs
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Wireless LAN 第一組 電機四 林長寬 B /11/24.
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
basics Richard Dunn CSE July 2, 2003.
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
Presentation transcript:

Dependability in Wireless Networks By Mohammed Al-Ghamdi

Outline: Introduction Physical Layer MAC layer Conclusion

Introduction WiFi short for “Wireless Fidelity” the trade name for a popular wireless technology Based on IEEE Can We Rely on WI-FI

Contd: Researcher and Hackers easily attack “Wired Equivalent Privacy” WEP. First security mechanism. Successful attack block a network and its services. Wireless network security overall depends on network to application. PHY and MAC layers.

Physical Layer Spec. –Uses a single narrow-band radio channel –At 2.4 to 5 GHz –Available power range allows an average radius of 100 m. (depend) –Node same freq. share same channel –Two different basic coding techniques Direct Sequence Spread Spectrum DSSS(11b and 11g). Orthogonal Frequency Division Multiplexing OFDM (11a).

Contd: These chars. Allow several attacks !  Interception  Injection  Jamming  Locating mobile nodes  Hijacking

Contd: Interception –Attacker can intercept a radio communication easily. – not prevent traffic analysis. –Sol: Apply mechanisms at MAC layer or above. Prevent information leakage.

Contd: Injection –Radio transmissions can not restricted in specific area. –Prevent establishing firewalls and network intrusion system. –Sol: MAC provide data source authentication for transmitted frame.

Contd: Jamming –Radio transmission subject to jamming easily (narrow-band). –Make WLAN unavailable. Locating Mobile Nodes –Attacker easily track MAC address ?? –Built database that lists wireless node. –Track the device owner’s location

Contd: Hijacking –It’s difficult than interception and injection –Attacker make sure that two victim not talk directly –Jam the receiver while accessing the transmitted by using directional antenna near the sender.

MAC layer It is Media Access Control layer. Sub-layer data link layer provides addressing and channel access control mechanisms Has weakness features –Implement shared channel –Can have star or mesh topology

Shared Channel Nodes use same channel. You need to distinguish nodes. Use MAC address as identifier.

Contd: Jamming –Radio transmission subject to jamming easily (narrow-band). –Make WLAN unavailable. Locating Mobile Nodes –Attacker easily track MAC address ?? –Built database that lists wireless node. –Track the device owner’s location

Shared Channel Nodes use same channel. You need to distinguish nodes. Use MAC address as identifier. Even if communication encrypted, header must remain. Shared channel implies shared bandwidth. Several nodes lower transmission speed

Contd: uses logical mechanism to detect the channel ( free or busy ). Duration field in the header. Attack change this field.

Topology Two different modes of network topology. 1.The infrastructure mode ( star ) 2.The ad hoc mode ( mesh )

Star topology AP

Mesh topology

Coclsuion Introduction Physical Layer MAC layer Conclusion

Question time ?