Download presentation
Presentation is loading. Please wait.
Published byMeghan Singleton Modified over 9 years ago
1
Wireless Security
2
Traditional method A computer with network card a cable connecting network card and the network
7
Wireless technology at home Infrared (IR) or Radio transmission e.g. remote control, cordless computer keyboards and mouse, stereo headsets Short distance, simple signals
8
Wireless connection Access point with cable connection to the network IEEE802.11 wireless LAN card
9
Figure 1: Mobile Devices
10
IEEE802.11x standards Developed by IEEE (Institute of Electronic and Electrical Engineers) Have many standards (e.g. IEEE802.11a, IEEE802.11b,IEEE802.11g, etc) Began in 1990 Took 7 years to complete the first standard
11
Products available in the Market Only products of three standards IEEE802.11b First product in the market IEEE802.11a and IEEE802.11g arrive almost simultaneously IEEE802.11n finalized in 2010
12
comparison IEEE802. 11b IEEE802. 11g IEEE802. 11a IEEE802. 11n (Draft) speed11 Mbps54 Mbps 300Mbps Frequency2.4 GHz 5 GHz 2.4 GHz Advantages Popular inexpensive Compatible with IEEE802.11b Avoid interference with other devices (such as cordless phones, microwave oven) Faster than version b and g Compatible with b and g
13
Bluetooth Low-cost, low-power Cover 10 meters Max speed: 700 Kbps. Use 2.4 GHz radio frequency Not a competitor of IEEE 802.11 Replace cables in short distance
14
User Knowledge Lack of security features in mobile devices Immature wireless technology Security features not turned on Users unaware of security problems
15
Eavesdropping Figure 2 Eavesdropping by attacker
16
Program downloading Small memory More often to download program
18
Eavesdropping Difficult to discover Can use ordinary mobile device to attack (e.g. notebook computer) Software available in public domain Can attack from 20 miles away
20
Potential thread of download programs Reading or writing files (such as passwords) on the devices Delete files Connecting to other computers or devices perform illegal operations (such as hacking)
21
Jamming
22
Steps in jamming Listen to communication first Collect information Break the communication Impersonate the jammed user to continue communication Or impersonate the server
23
Jamming
24
Man-in-the-middle Listen to communication Intercepts the message Modify or add data in the message Confidential and integrity problem
27
Identity of attacker Mobile device is small (e.g. PDA) Difficult to detect Difficult to locate the attacker
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.