Download presentation
Presentation is loading. Please wait.
Published byHarold Brooks Modified over 9 years ago
1
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009
2
Taking Steps Towards a Wireless World
3
What is a Wireless Network? A group of connected devices that communicate through the air by means of electromagnetic waves, such as radio waves.
4
Types of Wireless Networks WPAN’s dynamically connect devices within a relatively small area; maintain random network configurations. i.e. Bluetooth, ad-hoc networks WLAN’s connect devices over a more broad area, known as a cell. Can be found in our homes, libraries, and coffee shops. i.e. Wi-Fi, laser bridges WPAN’s dynamically connect devices within a relatively small area; maintain random network configurations. i.e. Bluetooth, ad-hoc networks WLAN’s connect devices over a more broad area, known as a cell. Can be found in our homes, libraries, and coffee shops. i.e. Wi-Fi, laser bridges
5
Types of Wireless Networks WMAN’s are the connection of multiple WLAN’s and may span an entire city or college campus. i.e. WiMAX Mobile device networks which are used by our cell phones. i.e. GSM (2G), 3G cellular networks WMAN’s are the connection of multiple WLAN’s and may span an entire city or college campus. i.e. WiMAX Mobile device networks which are used by our cell phones. i.e. GSM (2G), 3G cellular networks
6
Wireless Applications Laptops Cellular phones Headphones Keyboards Printers Speakers Global Positioning Systems (GPS) Laptops Cellular phones Headphones Keyboards Printers Speakers Global Positioning Systems (GPS) Laser Bridges Emergency Services Robotics Biotechnology Nanotechnology Radio Frequency Identification (RFID) transponders The possibilities are endless!
7
What is RFID? By means of a simple integrated circuit and an antenna, RFID tags can quickly and reliably identify nearly anything when scanned with an RFID reader.
8
Radio Frequency Identification Three types: 1.Passive does not have a power supply. 2.Active has a power supply that powers the transmission. 3.Semi-passive has a power supply that powers the chip, but not the transmission. Three types: 1.Passive does not have a power supply. 2.Active has a power supply that powers the transmission. 3.Semi-passive has a power supply that powers the chip, but not the transmission.
9
Our Responsibility We must understand and adequately address the inherent security risks involved with wireless networking. Physical theft 1.Be aware of your surroundings. 2.Secure your devices when they are not in use. Wireless medium
10
Wireless Network Security.
11
Types of unauthorized access : -Accidental association -Malicious association -Ad-hoc networks -Non-traditional networks -Accidental association -Malicious association -Ad-hoc networks -Non-traditional networks
12
Types of unauthorized access : -Identity theft (MAC spoofing) -Man-in-the- middle attacks - Denial of service -Network injection - Café Latte attack
13
Counteracting security risks All wireless LAN devices need to be secured All users of the wireless network need to be educated in wireless network security All wireless networks need to be actively monitored for weaknesses and breaches All wireless LAN devices need to be secured All users of the wireless network need to be educated in wireless network security All wireless networks need to be actively monitored for weaknesses and breaches
14
There are some very good cryptographic tools that can be used to protect digital resources. Many of these tools have proven security The problem is usually bad implementations point-to-point security The best cryptographic security is point-to-point security (such as VPN) The source & destination ― are mutually authenticated (with public key cryptography) ― exchange privately a fresh secret key (with public key cryptography) ― use symmetric key encryption scheme to encrypt exchanged data (with symmetric key cryptography There are some very good cryptographic tools that can be used to protect digital resources. Many of these tools have proven security The problem is usually bad implementations point-to-point security The best cryptographic security is point-to-point security (such as VPN) The source & destination ― are mutually authenticated (with public key cryptography) ― exchange privately a fresh secret key (with public key cryptography) ― use symmetric key encryption scheme to encrypt exchanged data (with symmetric key cryptography
15
Point-to-point security ― Authentication usually involves certificates (a trusted third party certifies the public key of the entities) and a cryptographic handshake. ― WIMAX uses the Extensible Authentication Protocol for this purpose. ― For encryption it uses block ciphers such as DES3 or AES This offers protection at the protocol layer ― There are still problems at the physical layer, such as jamming attacks (Denial-of-Service), or flooding attacks Security vs. functionality tradeoff ― Rule of thumb: the more security the less functionality … Point-to-point security ― Authentication usually involves certificates (a trusted third party certifies the public key of the entities) and a cryptographic handshake. ― WIMAX uses the Extensible Authentication Protocol for this purpose. ― For encryption it uses block ciphers such as DES3 or AES This offers protection at the protocol layer ― There are still problems at the physical layer, such as jamming attacks (Denial-of-Service), or flooding attacks Security vs. functionality tradeoff ― Rule of thumb: the more security the less functionality …
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.