Download presentation
Presentation is loading. Please wait.
Published byVivian Goodwin Modified over 9 years ago
1
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk
2
Overview Infrastructure Networks vs. Ad Hoc Networks Access Points (AP) Secure vs. Non-secure Data Encryption Public vs. Private Available to everyone
3
Types of Wireless Security Wireless Portals – Computers running server software that manages the every connection on a given access point. (ex. Monowall, noCatAuth, & WiFiDog) Security Protocols – Standardized software that is installed both an access point and client computer which dictate how the computer and access point should communicate. (ex. Web Encryption Protocol(EAP), Password Authentication Protocol (PAP))
4
What is the big deal about wireless security? -“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards - and even then I have my doubts. ” Eugene H. Spafford, director of the Purdue Center for Education and Research in Information Assurance and Security. -Sensitive Data (Passwords, Social Security Numbers, Credit Card Information, Personal Content) -Data is only as secure as the computer that it is transmitted to/from.
5
Wireless Vulnerabilities -Wireless / Network Sniffing -Wireless Probing -MAC Address Spoofing / IP Spoofing -Man in the middle attack -Address Resolution Protocol (ARP) Poisoning -Denial of Service
6
Wireless Vulnerabilities -We have a problem. -How can something possibly be public and secure? -A new protocol -Wireless Portal
7
CHOICE Network -Protocol For Authorization of Negotiation of Services (PANS). -Lightweight mechanism -That provides authorization, access control, privacy, security, local mobility, and last-hop Quality of Service (QoS) -Personalized key. Uses a key and a token to encrypt data. -Implementation of a protocol that could possibly be used for a Public and Secure Wireless Network
8
Illustration of CHOICE Secure Wireless Internet Access in Public Places, Paramvir Bahl, Srinivasan Venkatachary http://www.cs.ucsd.edu/~abalacha/research/papers/ICC01.pdf
9
CHOICE Network Downfalls -Proprietary -Uses a new protocol -Can probably still be cracked.
10
Linux Wireless Portal -Machine connected directly to the AP -Running a Linux based Wireless Portal -Portal manages all connections between clients and internet.
11
Linux Wireless Portal Downfalls -Very vulnerable to sniffing, since packets over the air are not encrypted. -Uses MAC address as reference to client
12
What Next? -Wireless Portal -Users should be given less freedom on the network. (i.e. no access to local subnet) -Encryption of data is possible with application on client side. (from web browser or download). -Doesn’t require a new protocol.
13
Questions? ?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.