Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.

Slides:



Advertisements
Similar presentations
IEEE Overview Mustafa Ergen UC Berkeley
Advertisements

Network Fundamentals – Chapter 7
LAN Protocol Architecture
WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
1 6/11/ :41 Chapter 10Wireless LANs1 Rivier College CS575: Advanced LANs Chapter 10: Wireless LANs.
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
OSI Model.
& WEP Tzachy Reinman System and Network Security Course
Wireless Local Area Networks (WLAN)
Networks Olga Agnew Bryant Likes Daewon Seo.
IEEE Wireless LAN Standard
Network and Internet Security
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Network Security Wireless LAN. Network Security About WLAN  IEEE standard  Use wireless transmission medium such as radio, microwave, infrared.
Wireless and Security CSCI 5857: Encoding and Encryption.
Wireless Networking.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
CWNA Guide to Wireless LANs, Second Edition
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Chapter 5 WIRELESS NETWORK SECURITY
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
OV Copyright © 2015 Logical Operations, Inc. All rights reserved. Unbounded Network Media  Wireless Networking  Wireless Network Devices and Components.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Lecture 11 Wireless security
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Implementations  Ethernet Networks  Wireless Networks.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
IEEE Wireless LAN Standard
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
WEP Protocol Weaknesses and Vulnerabilities
Jaringan Komputer Dasar Data Link Layer (2) Aurelio Rahmadian.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Architecture of an infrastructure network Distribution System Portal 802.x LAN Access Point LAN BSS LAN BSS 1 Access Point STA.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
LOCAL AREA NETWORKS. LAN PROTOCOL ARCHITECTURE The basic functions of a LAN is organized by set of layering protocols. IEEE 802 Reference Model Protocols.
Lecture 24 Wireless Network Security
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Security Standards. IEEE IEEE 802 committee for LAN standards IEEE formed in 1990’s – charter to develop a protocol & transmission specifications.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
IEEE Wireless LAN Standard
WLAN.
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Wireless Network Security CSIS 5857: Encoding and Encryption.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
IEEE Wireless LAN Standard
1 Wireless Networks Lecture 26 Wireless LAN / IEEE Dr. Ghalib A. Shah.
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Wireless Local Area Network (WLAN)
CT1303 LAN Rehab AlFallaj.
Wireless Mesh Networks
802 Layering 802 Committee Subdivided the Data Link Layer OSI 802
Chapter 6 Medium Access Control Protocols and Local Area Networks
basics Richard Dunn CSE July 2, 2003.
Presentation transcript:

Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1

 IEEE Wireless LAN Overview  IEEE i Wireless LAN Security  Wireless Application Protocol Overview  Wireless Transport Layer Security

 IEEE is a standard for wireless LANs and referred to as Wi-Fi  IEEE i specifies security standards for IEEE LANs, including authentication, data integrity, data confidentiality, and key management  Wireless Application Protocol (WAP) gateway is a standard providing mobile users(wireless phones and other wireless terminals) access to telephony and information services (Internet & Web)  Wireless Transport Layer Security (WTLS) provides security services between mobile device and WAP gateway to the Internet

 IEEE 802 is a committee developed standards for a wide range of local area networks (LANs)  IEEE is a committee developed a protocol and transmission specifications for wireless LANs (WLANs) 1990 in

 Physical layer (lowest layer of the IEEE 802 reference model)  Physical layer functions are:  Encoding/decoding of signals  Bit transmission/reception  Specification of transmission medium  Defines frequency bands and antenna characteristics  IEEE specifies five distinct frequency ranges: 2.4 GHZ, 3.6 GHz, 4.9 GHz, 5 GHz, and 5.9 GHz  Each range is divided into a multitude of channels  IEEE specifies five distinct frequency ranges: 2.4 GHZ, 3.6 GHz, 4.9 GHz, 5 GHz, and 5.9 GHz  Each range is divided into a multitude of channels

ChannelChannel width –2.423 GHz –2.428 GHz –2.433 GHz –2.438 GHz –2.443 GHz –2.448 GHz –2.453 GHz –2.458 GHz –2.463 GHz –2.468 GHz –2.473 GHz –2.478 GHz –2.483 GHz –2.495 GHz

 Media Access Control (MAC) is an access controller to the transmission medium  MAC layer receives data from Logical Link Control (LLC) layer in form of a block of data known as MAC service data unit (MSDU)  MAC layer functions are: 1. On transmission, assemble data into a frame MAC protocol data unit (MPDU) with address and error- detection fields 2. On reception, disassemble frame, perform address recognition, error detection and discarding any frames containing errors 3. Govern access to LAN transmission medium

 MAC Control: contains any protocol control information needed for functioning of MAC protocol (priority level)  Destination MAC Address: The destination physical address on LAN  Source MAC Address: The source physical address on LAN  MAC Service Data Unit: The data from the next higher layer  CRC (cyclic redundancy check field) also known as Frame Check Sequence (FCS) field is an error-detecting code

 LOGICAL LINK CONTROL (LLC) (higher layer of the IEEE 802 reference model)  LLC layer functions are:  Preserve successfully received frames  Retransmit unsuccessful frames

BSS: Basic Service Set DS: Distribution system AP: Access Point IBSS: I ndependent BSS ESS: Extended Service Set consists of two or more BSS interconnected by a distribution system

 Association: establishes an initial association between a station and an AP  Reassociation: establishes an association between one AP to another, allowing a mobile station to move from one BSS to another  Disassociation: A notification from a station or an AP for a terminated association

 Integration service enables transfer of data between a station on an IEEE LAN and a station on an integrated IEEE 802.x LAN  Distribution is used by stations to exchange MPDUs  Deauthentication frame is send by AP or a Station when all communications are terminated

wired LANwireless LAN to transmit over a wired LAN, a station must be physically connected to the LAN any station within radio range can transmit to receive over a wired LAN, a station must be physically connected to the LAN any station within radio range can receive Increased need for robust security services and mechanisms for wireless LANs

IEEE i Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Robust Security Network (RSN )

 Authentication: A protocol provides mutual authentication and generates temporary keys to be used between the client and the AP over the wireless link  Access control: A protocol enforces using authentication function, routes messages properly, and facilitates key exchange  Privacy with message integrity: MPDU are encrypted along with a message integrity code that ensures that the data have not been altered

 Wireless Application Protocol (WAP) is standard developed by WAP forum to provide mobile users of wireless phones and other wireless terminals access to telephony and information services (Internet & Web)

1. Confidentiality 2. Integrity 3. Authentication 4. Nonrepudiation

 Cryptographic techniques: provides services for signing of data for integrity and non-repudiation purposes  Authentication: provides mechanisms for client and server authentication. Transport Services layer (TLS) handshakes may be used to authenticate clients and servers  Identity: provides functions to process information needed for user identification  Public key infrastructure (PKI) supports distribution and identification of public encryption keys

 WTLS provides security services between the mobile device (client) and the WAP gateway  WTLS Security services 1. Data integrity: uses message authentication to ensure that data sent between client and gateway are not modified 2. Privacy: uses encryption to ensure that data cannot be read by third party 3. Authentication: uses digital certificates to authenticate two parties 4. Denial-of-service protection: detects and rejects messages that are replayed or not successfully verified

22

1. nnetworks-wlan-security-and-analysis nnetworks-wlan-security-and-analysis 2. hannels hannels