Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005
Overview Popularity of Wireless Networks Benefits of Wireless Networks Vulnerabilities in Wireless Networks Some solutions to enhance security in wireless networks
Popularity of Wireless Networks Executives of 180 firms using more than 500 personal computers, 40 percent have already implemented wireless networks, while another 31 percent plan on rolling out wireless support in the next 18 months. (Wireless Ethernet Compatibility Alliance) More than 1 million WLAN access points are in use by more than 700,000 U.S. enterprises. (Yankee Group in Boston)
Wireless Technologies Wireless technologies allow devices to communicate without physical connections All data transmission is traveling over the medium of radio frequency wireless technologies are currently from one main standard: The b standard is the first WLAN standard Other newer standards: a, g, n …etc
WLAN Standards TypeFrequencySpeedNotes b2.4GHz < 11Mbps a 5 GHz 54 Mbps g 2.4 GHz 54 Mbps Interoperable with b n Multiple frequencies 540 Mbps
Benefits of WLANs User Mobility: users now can be mobile yet retain high-speed, real-time access to the enterprise LAN Rapid Installation: time required for installation is reduced tremendously Flexibility: enterprises can now install and take down WLANs in their locations easily Scalability: WLAN network topologies can easily be configured to adapt specific business applications needs
Benefits of WLANs
Vulnerabilities in WLAN Easy Access Easy Access Rogue Access Points Rogue Access Points Unauthorized Use of Service Unauthorized Use of Service Service and Performance Constraints Service and Performance Constraints MAC Spoofing and Session Hijacking MAC Spoofing and Session Hijacking Traffic Analysis and Eavesdropping Traffic Analysis and Eavesdropping Higher Level Attacks Higher Level Attacks
Security Breaches Best Buy Co. ran into trouble in the spring of 2002 when customers who had purchased WLAN cards from Best Buy installed the cards in their laptops before they left the parking lot. The customers noticed unencrypted WLAN traffic that contained customer information and possibly credit card numbers.” (Ohrtman and Roeder) Best Buy Co. ran into trouble in the spring of 2002 when customers who had purchased WLAN cards from Best Buy installed the cards in their laptops before they left the parking lot. The customers noticed unencrypted WLAN traffic that contained customer information and possibly credit card numbers.” (Ohrtman and Roeder) Netstumbler to identify unsafe WLANs Netstumbler to identify unsafe WLANs
Netstumbler Application
Security Breaches: Methods Wardriving Wardriving Airsnort & WEPcrack passively monitor transmissions and compute the encryption key when enough packets have been gathered Airsnort & WEPcrack passively monitor transmissions and compute the encryption key when enough packets have been gathered
How to Secure WLAN Enforce Strong Access Control Enforce Strong Access Control Regular Site Audits Regular Site Audits Design and Audit for Strong Authentication Design and Audit for Strong Authentication AuthenticityAuthenticity NonrepudiationNonrepudiation AccountabilityAccountability Adopt Strong Protocols Adopt Strong Protocols Perform Risk Analysis Perform Risk Analysis Protect the Core from the Wireless LAN Protect the Core from the Wireless LAN
Conclusion The only truly secure network is the one never built The only truly secure network is the one never built WLAN protocols are still evolving to meet the needs of businesses WLAN protocols are still evolving to meet the needs of businesses more vigilant due to new and open security holes when deploying wireless technologies more vigilant due to new and open security holes when deploying wireless technologies Even though WLAN are becoming popular and a cost-effective alternative to traditional wired networks, reasonable precautions and vigilance must be taken in order to make wireless networks safe