Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.

Similar presentations


Presentation on theme: "Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk."— Presentation transcript:

1 Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk

2 Overview Infrastructure Networks vs. Ad Hoc Networks Access Points (AP) Secure vs. Non-secure Data Encryption Public vs. Private Available to everyone

3 Types of Wireless Security Wireless Portals – Computers running server software that manages the every connection on a given access point. (ex. Monowall, noCatAuth, & WiFiDog) Security Protocols – Standardized software that is installed both an access point and client computer which dictate how the computer and access point should communicate. (ex. Web Encryption Protocol(EAP), Password Authentication Protocol (PAP))

4 What is the big deal about wireless security? -“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards - and even then I have my doubts. ” Eugene H. Spafford, director of the Purdue Center for Education and Research in Information Assurance and Security. -Sensitive Data (Passwords, Social Security Numbers, Credit Card Information, Personal Content) -Data is only as secure as the computer that it is transmitted to/from.

5 Wireless Vulnerabilities -Wireless / Network Sniffing -Wireless Probing -MAC Address Spoofing / IP Spoofing -Man in the middle attack -Address Resolution Protocol (ARP) Poisoning -Denial of Service

6 Wireless Vulnerabilities -We have a problem. -How can something possibly be public and secure? -A new protocol -Wireless Portal

7 CHOICE Network -Protocol For Authorization of Negotiation of Services (PANS). -Lightweight mechanism -That provides authorization, access control, privacy, security, local mobility, and last-hop Quality of Service (QoS) -Personalized key. Uses a key and a token to encrypt data. -Implementation of a protocol that could possibly be used for a Public and Secure Wireless Network

8 Illustration of CHOICE Secure Wireless Internet Access in Public Places, Paramvir Bahl, Srinivasan Venkatachary http://www.cs.ucsd.edu/~abalacha/research/papers/ICC01.pdf

9 CHOICE Network Downfalls -Proprietary -Uses a new protocol -Can probably still be cracked.

10 Linux Wireless Portal -Machine connected directly to the AP -Running a Linux based Wireless Portal -Portal manages all connections between clients and internet.

11 Linux Wireless Portal Downfalls -Very vulnerable to sniffing, since packets over the air are not encrypted. -Uses MAC address as reference to client

12 What Next? -Wireless Portal -Users should be given less freedom on the network. (i.e. no access to local subnet) -Encryption of data is possible with application on client side. (from web browser or download). -Doesn’t require a new protocol.

13 Questions? ?


Download ppt "Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk."

Similar presentations


Ads by Google