Download presentation
Presentation is loading. Please wait.
Published byMyrtle Hunt Modified over 9 years ago
1
Wireless Network Security
2
How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium, the air.
3
Security Concerns Types of attacks Passive Attacks Eavesdropping Active Attacks Registration of a Malicious Node Replay Attack Denial of Service Common flooding Rogue access point Man in the Middle Attacks Types of attacks Passive Attacks Eavesdropping Active Attacks Registration of a Malicious Node Replay Attack Denial of Service Common flooding Rogue access point Man in the Middle Attacks
4
Goals Availability Require network assets are available when needed and ensure the survivability of the network services despite DOS attacks Confidentiality Ensure that certain information is never disclosed to unauthorized entities Routing information must also remain secure Integrity Guarantees that the information being transferred is never altered Availability Require network assets are available when needed and ensure the survivability of the network services despite DOS attacks Confidentiality Ensure that certain information is never disclosed to unauthorized entities Routing information must also remain secure Integrity Guarantees that the information being transferred is never altered
5
Challenges Attacks can come from all directions and target any node Damage can include leaking secret information, interfering message delivery and impersonating nodes Have inadequate physical protection and therefore the network can be more easily compromised Attacks can come from all directions and target any node Damage can include leaking secret information, interfering message delivery and impersonating nodes Have inadequate physical protection and therefore the network can be more easily compromised
6
Solutions MD5 with 128-bit encryption Keeps information confidential With a shared random number prevents replay attacks Prevent unauthorized access using MAC filtering Physical security Secure the building and shield it from outside interference MD5 with 128-bit encryption Keeps information confidential With a shared random number prevents replay attacks Prevent unauthorized access using MAC filtering Physical security Secure the building and shield it from outside interference
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.