Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless Technology & Security. Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute.

Similar presentations


Presentation on theme: "Wireless Technology & Security. Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute."— Presentation transcript:

1 Wireless Technology & Security

2 Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute of Electrical and Electronics Engineers Not for profit Not for profit Sets the standards for 802.11 Sets the standards for 802.11 What is 802.11? What is 802.11? Set of standards for WLAN Set of standards for WLAN Progressing with technology Progressing with technology Change is denoted with a letter Change is denoted with a letter http://www.ieee.org/web/aboutus/home/index.html

3 Wi-Fi and 802.11 Wi-Fi (wireless fidelity) Wi-Fi (wireless fidelity) WLAN products that utilize 802.11 standards WLAN products that utilize 802.11 standards Wi-Fi Alliance Wi-Fi Alliance Oversees tests of product certification Oversees tests of product certification Products certified Wi-Fi will work with all 802.11 standards Products certified Wi-Fi will work with all 802.11 standards http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci838865,00.html

4 Wireless & Business By 2007-2008 By 2007-2008 65% of enterprises will have wireless applications deployed 65% of enterprises will have wireless applications deployed With mobile devices outnumbering traditional PCs With mobile devices outnumbering traditional PCs -Editors of Computer World

5 By the dollars Total U.S. spending on wireless communications will grow by 9.3% this year, reaching $158.6 billion. It’s predicted to hit $212.5 billion by 2008, with a 10% compound annual growth rate. Total U.S. spending on wireless communications will grow by 9.3% this year, reaching $158.6 billion. It’s predicted to hit $212.5 billion by 2008, with a 10% compound annual growth rate. -Editors of Computer World

6 Keys for Growth in Business Improved Security Improved Security Steve will address specifics Steve will address specifics Increased Options involving Increased Options involving Speed Speed Range Range Frequency Frequency -Editors of Computer World

7 802.11b & a

8 “a” implemented in 1999 “a” implemented in 1999 After 802.11b, 2.4GHz and 11 Mbps After 802.11b, 2.4GHz and 11 Mbps Differences from 802.11b Differences from 802.11b Enhanced data speed to 54 Mbps Enhanced data speed to 54 Mbps Operates in the 5 GHz band Operates in the 5 GHz band Less interference Less interference http://www.computerworld.com http://www.siliconvalley.internet.com

9 802.11g

10 Speed 54 Mbps Speed 54 Mbps Operates in a 2.4 GHz ISM Band Operates in a 2.4 GHz ISM Band Is it better than a or b? Is it better than a or b? Yes and No Yes and No http://siliconvalley.internet.com 802.11g

11 Compatibility of 802.11g 802.11b 802.11b a,b, and g a,b, and g Combination Combination More expensive More expensive http://www.computerworld.com

12 Disadvantages of 802.11g Range can be reduced. Range can be reduced. Radio Frequency Radio Frequency Only has 3 fully non-overlapping channels. Only has 3 fully non-overlapping channels. Others can handle up to 11 Others can handle up to 11 Before this standard was fully ratified, 802.11n was already being discussed. Before this standard was fully ratified, 802.11n was already being discussed. http://siliconvalley.internet.com http://www.computerowrld.com

13 Advantages of 802.11g Compatibility Compatibility “Ultimately it takes the guesswork away from the user.” –Ben Worthen “Ultimately it takes the guesswork away from the user.” –Ben Worthen It’s a “life extension” of 802.11b It’s a “life extension” of 802.11b Higher speeds with little price increase. Higher speeds with little price increase. Use it when greater coverage is needed and cost is a big factor. Use it when greater coverage is needed and cost is a big factor. http://www.cio.com

14 802.11n

15 Definition 802.11n is a newer standard 802.11n is a newer standard Proper name = IEEE (International Institute of Electrical and Electronics Engineers) Proper name = IEEE (International Institute of Electrical and Electronics Engineers) The number “11” indicates the IEEE working group within this body, known as TGn. The number “11” indicates the IEEE working group within this body, known as TGn. http://www.wisegeek.com/what-is-80211n.htm

16 IEEE WLAN Standard Over-the-Air (OTA) Estimates Media Access Control Layer, Service Access Point (MAC SAP) Estimates 802.11b11 Mbps5 Mbps 802.11g54 Mbps25 Mbps (when.11b is not present) 802.11a54 Mbps25 Mbps 802.11n200+ Mbps100 Mbps Wireless LAN Throughput by IEEE Standard

17 The hope of implementing 802.11n is so that consumers may be able to use more of a range of products. HDTV HDTV Streaming videos Streaming videos Other consumer electonics Other consumer electonics Personal computing Personal computing Hand held platforms Hand held platforms

18 Where can it be used if implemented? All major environments including: All major environments including: Enterprises Enterprises Households Households Wireless Networks Wireless Networks Public hotspots Public hotspots Coffee Houses (Starbucks, Internet Cafes) Coffee Houses (Starbucks, Internet Cafes) Pizza Parlors (American Dream) Pizza Parlors (American Dream) Schools (OSU entire campus) Schools (OSU entire campus)

19 What is a hotspot? Hotspot = Hotspot = Public Area Public Area Wireless network connections to the internet Wireless network connections to the internet NIC = Network Interface Card NIC = Network Interface Card Have to ask permission to log onto the network Have to ask permission to log onto the network Sometimes is free other times costs a small fee (i.e. Starbucks) Sometimes is free other times costs a small fee (i.e. Starbucks)http://www.wisegeek.com/what-is-a-hotspot.htm

20 Current Status of 802.11n Meeting in January 2006 in Kona, Hawaii Meeting in January 2006 in Kona, Hawaii Wave of the future Wave of the future Price range of $89.50 - $159.00 Price range of $89.50 - $159.00 Only for a pre-N router Only for a pre-N router

21 Benefits of 802.11n The connection speed is really fast The connection speed is really fast It has a great, wide reaching range It has a great, wide reaching range Comes with software that is compatible with both Windows and Macintoshes. Comes with software that is compatible with both Windows and Macintoshes.

22 Disadvantages of 802.11n It is very expensive as compared with the other routers for b/a/g It is very expensive as compared with the other routers for b/a/g Requires a MIMO adapter to be able to use it full potential. Requires a MIMO adapter to be able to use it full potential. http://google-cnet.com/4014-3319_9-30993672.html?part=google- cnet&subj=103011980&tag=103011980

23 Have the best of the best!!!

24 Wireless Security References: www.wifi-planet.com www.wikipedia.org www.tomsnetworking.com http://engr.oregonstate.edu/computing/

25 Protecting Access and Signal Wireless Security needs to protect two separate parts of the wireless network. Wireless Security needs to protect two separate parts of the wireless network.  Access – Control who can access the network  Signal – Control who can read the signal.

26 Controlling Access End to End Encryption End to End Encryption  MAC Filtering  Controlling which devices can “Log on” to the network  This method can be hacked using a MAC Spoof  (kind of like identity theft for wireless computers)  SSID Broadcasting  Do not broadcast the SSID (Service Set Identifier)  If the hackers cannot see your network, it is harder to get into  One example of end to end encryption is online banking. Ever notice the https?  https://www.bankofamerica.com https://www.bankofamerica.com

27 Controlling the signal WEP – Wireless Equivalent Privacy WEP – Wireless Equivalent Privacy 64 or 128 bit encryption. 64 or 128 bit encryption. Very easy to break. Very easy to break. FBI demonstrated a 3 minute breach using common hacking software 1 FBI demonstrated a 3 minute breach using common hacking software 1 WPA – Wifi Protected Access WPA – Wifi Protected Access This adds additional security features to WEP. This adds additional security features to WEP. Much harder to crack and can use a pre-shared key (PSK) Much harder to crack and can use a pre-shared key (PSK) Like a secret password Like a secret password Based on the 801.11i standard Based on the 801.11i standard WPA2 – WPA with AES WPA2 – WPA with AES (Advanced Encryption Standard) (Advanced Encryption Standard) Algorithm from WPA is replaced by a message authentication code, CCMP Algorithm from WPA is replaced by a message authentication code, CCMP CCMP

28 Other ways to get secured VPN – Virtual Private Network VPN – Virtual Private Network Two types – Secure and Unsecured Two types – Secure and Unsecured Secured VPN Secured VPN uses cryptographic tunneling protocols to provide the necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), and message integrity (preventing message alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networks uses cryptographic tunneling protocols to provide the necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), and message integrity (preventing message alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networkscryptographictunnelingconfidentialitysnoopingauthenticationidentityspoofingmessageintegrityprivacycryptographictunnelingconfidentialitysnoopingauthenticationidentityspoofingmessageintegrityprivacy

29 Connecting to OSU_PUB Domain Enable Wireless LAN on your device Enable Wireless LAN on your device Go to the internet Go to the internet Browser will redirect you to the wireless security page for OSU (See next page) Browser will redirect you to the wireless security page for OSU (See next page) Enter login information (See next page) Enter login information (See next page) Enter computer information (See next page) Enter computer information (See next page) Quit browser (15-20 min) Quit browser (15-20 min) Surf Surf Your computer is now permanently registered with OSU (College of Engineering) Your computer is now permanently registered with OSU (College of Engineering)

30

31

32 Questions?


Download ppt "Wireless Technology & Security. Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute."

Similar presentations


Ads by Google