Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.

Similar presentations


Presentation on theme: "Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009."— Presentation transcript:

1 Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009

2 Taking Steps Towards a Wireless World

3 What is a Wireless Network? A group of connected devices that communicate through the air by means of electromagnetic waves, such as radio waves.

4 Types of Wireless Networks  WPAN’s dynamically connect devices within a relatively small area; maintain random network configurations. i.e. Bluetooth, ad-hoc networks  WLAN’s connect devices over a more broad area, known as a cell. Can be found in our homes, libraries, and coffee shops. i.e. Wi-Fi, laser bridges  WPAN’s dynamically connect devices within a relatively small area; maintain random network configurations. i.e. Bluetooth, ad-hoc networks  WLAN’s connect devices over a more broad area, known as a cell. Can be found in our homes, libraries, and coffee shops. i.e. Wi-Fi, laser bridges

5 Types of Wireless Networks  WMAN’s are the connection of multiple WLAN’s and may span an entire city or college campus. i.e. WiMAX  Mobile device networks which are used by our cell phones. i.e. GSM (2G), 3G cellular networks  WMAN’s are the connection of multiple WLAN’s and may span an entire city or college campus. i.e. WiMAX  Mobile device networks which are used by our cell phones. i.e. GSM (2G), 3G cellular networks

6 Wireless Applications  Laptops  Cellular phones  Headphones  Keyboards  Printers  Speakers  Global Positioning Systems (GPS)  Laptops  Cellular phones  Headphones  Keyboards  Printers  Speakers  Global Positioning Systems (GPS)  Laser Bridges  Emergency Services  Robotics  Biotechnology  Nanotechnology  Radio Frequency Identification (RFID) transponders The possibilities are endless!

7 What is RFID? By means of a simple integrated circuit and an antenna, RFID tags can quickly and reliably identify nearly anything when scanned with an RFID reader.

8 Radio Frequency Identification Three types: 1.Passive does not have a power supply. 2.Active has a power supply that powers the transmission. 3.Semi-passive has a power supply that powers the chip, but not the transmission. Three types: 1.Passive does not have a power supply. 2.Active has a power supply that powers the transmission. 3.Semi-passive has a power supply that powers the chip, but not the transmission.

9 Our Responsibility  We must understand and adequately address the inherent security risks involved with wireless networking.  Physical theft 1.Be aware of your surroundings. 2.Secure your devices when they are not in use.  Wireless medium

10 Wireless Network Security.

11 Types of unauthorized access :  -Accidental association  -Malicious association  -Ad-hoc networks  -Non-traditional networks  -Accidental association  -Malicious association  -Ad-hoc networks  -Non-traditional networks

12 Types of unauthorized access :  -Identity theft (MAC spoofing)  -Man-in-the- middle attacks  - Denial of service  -Network injection  - Café Latte attack

13 Counteracting security risks  All wireless LAN devices need to be secured  All users of the wireless network need to be educated in wireless network security  All wireless networks need to be actively monitored for weaknesses and breaches  All wireless LAN devices need to be secured  All users of the wireless network need to be educated in wireless network security  All wireless networks need to be actively monitored for weaknesses and breaches

14  There are some very good cryptographic tools that can be used to protect digital resources.  Many of these tools have proven security  The problem is usually bad implementations point-to-point security  The best cryptographic security is point-to-point security (such as VPN) The source & destination ― are mutually authenticated (with public key cryptography) ― exchange privately a fresh secret key (with public key cryptography) ― use symmetric key encryption scheme to encrypt exchanged data (with symmetric key cryptography  There are some very good cryptographic tools that can be used to protect digital resources.  Many of these tools have proven security  The problem is usually bad implementations point-to-point security  The best cryptographic security is point-to-point security (such as VPN) The source & destination ― are mutually authenticated (with public key cryptography) ― exchange privately a fresh secret key (with public key cryptography) ― use symmetric key encryption scheme to encrypt exchanged data (with symmetric key cryptography

15  Point-to-point security ― Authentication usually involves certificates (a trusted third party certifies the public key of the entities) and a cryptographic handshake. ― WIMAX uses the Extensible Authentication Protocol for this purpose. ― For encryption it uses block ciphers such as DES3 or AES  This offers protection at the protocol layer ― There are still problems at the physical layer, such as jamming attacks (Denial-of-Service), or flooding attacks  Security vs. functionality tradeoff ― Rule of thumb: the more security the less functionality …  Point-to-point security ― Authentication usually involves certificates (a trusted third party certifies the public key of the entities) and a cryptographic handshake. ― WIMAX uses the Extensible Authentication Protocol for this purpose. ― For encryption it uses block ciphers such as DES3 or AES  This offers protection at the protocol layer ― There are still problems at the physical layer, such as jamming attacks (Denial-of-Service), or flooding attacks  Security vs. functionality tradeoff ― Rule of thumb: the more security the less functionality …

16


Download ppt "Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009."

Similar presentations


Ads by Google