Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless Security.

Similar presentations


Presentation on theme: "Wireless Security."— Presentation transcript:

1 Wireless Security

2 Traditional method A computer with network card
a cable connecting network card and the network

3 Wireless technology at home
Infrared (IR) or Radio transmission e.g. remote control, cordless computer keyboards and mouse, stereo headsets Short distance, simple signals

4 Wireless connection Access point with cable connection to the network
IEEE wireless card

5 Figure 1: Mobile Devices

6 IEEE802.11x standards Developed by IEEE (Institute of Electronic and Electrical Engineers) Have many standards (e.g. IEEE802.11a, IEEE802.11b,IEEE802.11g, etc) Began in 1990 Took 7 years to complete the first standard

7 Products available in the Market
Only products of three standards IEEE802.11b First product in the market IEEE802.11a and IEEE802.11g arrive almost simultaneously

8 comparison IEEE802. 11b 11g 11a speed 11 Mbps 54 Mbps Frequency
2.4 GHz 5 GHz Advantages Popular inexpensive Compatible with IEEE802.11b Avoid interference with other devices (such as cordless phones, microwave oven)

9 Bluetooth Low-cost, low-power Cover 10 meters Max speed: 700 Kbps.
Use 2.4 GHz radio frequency Not a competitor of IEEE Replace cables in short distance

10 User Knowledge Lack of security features in mobile devices
Immature wireless technology Security features not turned on Users unaware of security problems

11 Figure 2 Eavesdropping by attacker

12 Program downloading Small memory More often to download program

13 Eavesdropping Difficult to discover
Can use ordinary mobile device to attack (e.g. notebook computer) Software available in public domain Can attack from 20 miles away

14 Potential thread of download programs
Reading or writing files (such as passwords) on the devices Delete files Connecting to other computers or devices perform illegal operations (such as hacking)

15 Jamming

16 Steps in jamming Listen to communication first Collect information
Break the communication Impersonate the jammed user to continue communication Or impersonate the server

17 Jamming

18 Man-in-the-middle Listen to communication Intercepts the message
Modify or add data in the message Confidential and integrity problem

19 Identity of attacker Mobile device is small (e.g. PDA)
Difficult to detect Difficult to locate the attacker


Download ppt "Wireless Security."

Similar presentations


Ads by Google