Chapter 24 : Wireless Network Security

Chapter 24 : Wireless Network Security. Wireless Security Overview. concerns for wireless security are similar to those found in a wired environment security requirements are the same: confidentiality, integrity, availability, authenticity, accountability

Share Presentation
Embed Code
Link
Download Presentation

dalmar

dalmar + Follow

Download Presentation

Chapter 24 : Wireless Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

Presentation Transcript

  1. Chapter 24: Wireless Network Security
  2. Wireless Security Overview • concerns for wireless security are similar to those found in a wired environment • security requirements are the same: • confidentiality, integrity, availability, authenticity, accountability • most significant source of risk is the underlying communications medium
  3. Wireless Networking Components Wireless client: WIFI-enabled laptop/tablet, cell phone, Bluetooth device, … Access point: Cell towers, WIFI hotspots, wireless routers Transmission medium: carries signals
  4. Wireless Network Threats no central point of ctrl Bluetooth, PDAs attack targets access points that route protocol msgs or network mgmt. msgs
  5. Securing Wireless Transmission • Signal hiding (and SSID hiding) • Reduce signal strengths • Encryption: encrypt all wireless transmissions
  6. Securing Access Point • Disallow unauthorized access to the AP • Require authentication for any access including for devices wishing to attach themselves to the AP
  7. Securing Wireless Networks
  8. IEEE 802.11 Terminology
  9. Wireless Fidelity (Wi-Fi) Alliance • 802.11b • first 802.11 standard to gain broad industry acceptance • Wireless Ethernet Compatibility Alliance (WECA) • industry consortium formed in 1999 to address the concern of products from different vendors successfully interoperating • later renamed the Wi-Fi Alliance • term used for certified 802.11b products is Wi-Fi • has been extended to 802.11g products • Wi-Fi Protected Access (WPA) • Wi-Fi Alliance certification procedures for IEEE802.11 security standards • WPA2 incorporates all of the features of the IEEE802.11i WLAN security specification
  10. IEEE 802 Protocol Architecture
  11. General IEEE 802 MPDU Format
  12. IEEE 802.11 Architecture: Extended Service Set
  13. IEEE 802.11 Services
  14. Distribution of Messages Within a DS • the two services involved with the distribution of messages within a DS are: • distribution • integration
  15. Association Services
  16. Wireless LAN Security Protocols • Wired Equivalent Privacy (WEP) algorithm • 802.11 privacy • Wi-Fi Protected Access (WPA) • set of security mechanisms that eliminates most 802.11 security issues and was based on the current state of the 802.11i standard • Robust Security Network (RSN) • final form of the 802.11i standard
  17. Elements of IEEE 802.11i
  18. IEEE802.11iPhases ofOperation
  19. IEEE802.11iPhases ofOperation
  20. MPDU Exchange • authentication phase consists of three phases: • connect to AS • the STA sends a request to its AP that it has an association with for connection to the AS; the AP acknowledges this request and sends an access request to the AS • EAP (Extensible Authentication Protocol ) exchange • authenticates the STA and AS to each other • secure key delivery • once authentication is established, the AS generates a master session key and sends it to the STA
  21. IEEE802.11iKeys for DataConfidentialityand IntegrityProtocols
  22. Phases of Operation: 4-way Handshake
  23. Summary • wireless security overview • wireless network threats • wireless security measure • IEEE 802.11 wireless LAN overview • Wi-Fi alliance • IEEE 802 protocol architecture • IEEE 802.11 network components and architectural model • IEEE 802.11 services

Chapter 8: Network Security

Chapter 8: Network Security

Chapter goals: understand principles of network security: cryptography and its many uses beyond “confidentiality” authentication message integrity key distribution security in practice: firewalls security in application, transport, network, link layers. Chapter 8: Network Security.

1.62k views • 84 slides

Chapter 9

Chapter 9

Chapter 9. Wireless network. Wireless Network. In wireless network, data are carried by electrical wave (e.g., radio wave ) from one node to another. There is no physical cable/wire connecting one computer to another. Wired (Cabled) Network versus Wireless Network.

718 views • 32 slides

Wireless Sensor Network Security

Wireless Sensor Network Security

Wireless Sensor Network Security. Anuj Nagar CS 590. Introduction. Typical Wireless Sensor Network (WSN). Need for security. WSNs are becoming a cost effective, practical way to go about deploying sensor networks.

631 views • 16 slides

Chapter 18: Network Security

Chapter 18: Network Security

Chapter 18: Network Security. Business Data Communications, 5e. Types of Security. Information Security Computer Security Network Security. Security Requirements. Confidentiality Integrity Availability Authenticity. Security Threats. Passive attacks Release of message contents

935 views • 36 slides

Wireless Networking & Security

Wireless Networking & Security

Wireless Networking & Security. Greg Stabler Spencer Smith. Preview. Brief History of Wireless networking Types of Wireless Security Unsecured WEP WPA WPA2 Why use wireless encryption? Additional Security Measures for your router What to do if on an unsecured network.

406 views • 12 slides

Introduction to Wireless Security Lecture 10

Introduction to Wireless Security Lecture 10

Introduction to Wireless Security Lecture 10. Outline. The importance of Wireless communications Wireless networks and security risks Why is it so hard to secure wireless communications? Wireless communications and network security issues WEP WAP Bluetooth (reading)

793 views • 38 slides

ECE 454 / CS 594 Computer and Network Security

ECE 454 / CS 594 Computer and Network Security

ECE 454 / CS 594 Computer and Network Security. Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011. 1. Wireless Security 1 --Cellular Networks. Outline. Wireless networks Wireless security challenges GSM security

893 views • 70 slides

Local Wireless Network

Local Wireless Network

Local Wireless Network. - An wireless Access Point (AP) which is the bridge the ethernet network and the wireless network -The AP protect its wireless network from unauthorized users with different security protocols .

367 views • 14 slides

Telecommunications and Network Security

Telecommunications and Network Security

Telecommunications and Network Security. CISSP Guide to Security Essentials Chapter 10. Objectives. Wireline and wireless telecommunication technologies Wired and wireless network technologies Network topologies and cabling The OSI and TCP/IP network models. Objectives (cont.).

1.43k views • 119 slides

Wireless Network Security Comparison of WEP, WPA, RSN Protocols

Wireless Network Security Comparison of WEP, WPA, RSN Protocols

Wireless Network Security Comparison of WEP, WPA, RSN Protocols. By Rajanikanth Ragula CS Login: rragula. Introduction . Wireless LAN’s becoming popular. Fast, cost effective and flexible. Security became a critical issue. Wired Vs Wireless .

573 views • 25 slides

Wireless Network Security

Wireless Network Security

FORE SEC Academy Security Essentials. Wireless Network Security. Objectives. Learn how wireless networks are used Wireless architecture and protocols Common misconceptions Top 5 security risks Steps to planning a secure WLAN. Popular Wireless Devices.

1.79k views • 19 slides

CHAPTER 8 Wireless LAN

CHAPTER 8 Wireless LAN

CHAPTER 8 Wireless LAN. Wireless Network concepts and standard Wireless LAN Security. Chapter Objective. On completion of this chapter, you will be able to perform the following tasks: Understand Wireless network concepts Understand Wireless LAN standard (IEEE802.11)

322 views • 12 slides

Wireless LAN (network) security

Wireless LAN (network) security

Wireless LAN (network) security. Wireless security. - Is the process of preventing unauthorized access or damage to computers (damage data or damage application) using wireless network . - WLAN vulnerabilities: 1- Weak device – only authentication 2- Weak data encryption

286 views • 11 slides

Cryptography and Network Security Chapter 17

Cryptography and Network Security Chapter 17

Cryptography and Network Security Chapter 17. Fifth Edition by William Stallings Lecture slides by Lawrie Brown. Chapter 17 – Wireless Network Security.

607 views • 37 slides

Chapter 8: Network Security

Chapter 8: Network Security

Chapter goals: Understand principles of network security: cryptography and its many uses beyond “confidentiality” authentication message integrity key distribution security in practice: firewalls security in applications Internet spam, viruses, and worms. Chapter 8: Network Security.

666 views • 37 slides

Chapter 18: Security in Wireless Networks and Devices

Chapter 18: Security in Wireless Networks and Devices

Chapter 18: Security in Wireless Networks and Devices. Guide to Computer Network Security. Wireless technology is a new technology that started in the early 1970s.

367 views • 23 slides

Hacking 802.11 Wireless

Hacking 802.11 Wireless

Hacking 802.11 Wireless. Prabhaker Mateti Wright State University. Talk Outline. Wireless LAN Overview Wireless Network Sniffing Wireless Spoofing Wireless Network Probing AP Weaknesses Denial of Service Man-in-the-Middle Attacks War Driving Wireless Security Best Practices Conclusion.

2.82k views • 232 slides

Wireless Network Security By Patrick Yount and

Wireless Network Security By Patrick Yount and

Wireless Network Security By Patrick Yount and. CIS 4360 Fall 2009. Taking Steps Towards a Wireless World. What is a Wireless Network?. A group of connected devices that communicate through the air by means of electromagnetic waves, such as radio waves. Types of Wireless Networks.

344 views • 16 slides

CWSP Guide to Wireless Security

CWSP Guide to Wireless Security

CWSP Guide to Wireless Security. Chapter 7 Designing a Secure Wireless Network. Objectives. Describe the basic principles of security design Define network segmentation and tell how it can be used for WLANs List ways in which wireless hardware can be located securely

807 views • 57 slides

Chapter 8: Network Security

Chapter 8: Network Security

Chapter goals: understand principles of network security: cryptography and its many uses beyond “confidentiality” authentication message integrity key distribution security in practice: firewalls security in application, transport, network, link layers. Chapter 8: Network Security.

1.3k views • 88 slides

Network Security Essentials Chapter 6

Network Security Essentials Chapter 6

Network Security Essentials Chapter 6. Fourth Edition by William Stallings Lecture slides by Lawrie Brown. Chapter 6 – Wireless Network Security.

686 views • 37 slides

Wireless Security

Wireless Security

Wireless Security. by: Frank Pfleger. Overview. Introduction to Wireless Networks Secure the Network Wireless Security Mechanisms Unsecure the Network Security Mechanism Weaknesses Tools and Techniques Wardriving / Procedures. Introduction. Private Wi-Fi

506 views • 22 slides