1999 Cabletron Systems. Wireless Networking RoamAbout Security, FCC Regulations, and Safety 802.11 inherent security Wired Equivalent Privacy (WEP) FCC.

Slides:



Advertisements
Similar presentations
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
Advertisements

1999 Cabletron Systems. Wireless Networking RoamAbout Roaming Between AccessPoints Multi-channel roaming Associating multiple AccessPoints within the.
1999 Cabletron Systems Wireless Networking RoamAbout Enterasys Networks Access Computing Welcome.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
WLAN b a Johan Montelius
Introduction to Wireless Networking. Basic Wireless and Wired Network.
Security and Wireless LANs Or Fun and Profit With Your Neighbor’s Bandwidth Chris Murphy MIT Information Systems.
Wireless LAN Technology. WIRELESS LAN TECHNOLOGY SPREAD SPECTRUM LAN Configuration Except for quite small offices, a spread spectrum wireless LAN makes.
Wireless Networks: Personal, Local, Metropolitan Speedups, Security, Power John Schafer University of Michigan Ann Arbor CSG 10 May 2000
ESTeem Training Class ESTeem Overview. ESTeem Product Categories Licensed Serial – Long Range Application – Exclusive Use of FCC Frequency – PLC Emulation.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Wireless Networking 102.
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
1999 Cabletron Systems. Wireless Networking RoamAbout Introduction to Wireless Networking Overview of the Wireless functionality Applications for Wireless.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Sybex CCNA Chapter 12: Wireless Networks.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Module 5 Configuring Wireless Network Connection.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Wireless Encryption: WEP and cracking it. Eric Shea.
NSRI1 Security of Wireless LAN ’ Seongtaek Chee (NSRI)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE standard. PRESENTED BY: Samuel Grush and Barry Preston.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Setting Wireless Network At Home By: Parveen Sharma.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Your Wireless Network has No Clothes* William A. Arbaugh, Narendar Shankar Y.C. Justin Wan University of Maryland Presentation by Eddy Purnomo,
CSE 5/7349 – April 5 th 2006 Wireless Networking.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Module 5 Configuring Wireless Network Connections.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Access Point Extender/bridge Radio card SSID - Service Set Identifier “An identifier attached to packets sent over the wireless LAN that functions as a.
Wireless LAN Concepts. Wireless LAN Standards.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Wireless Technologies
CompTIA Security+ Study Guide (SY0-401)
Wireless Network Computer Science Engineering Technical English II
Wireless Technologies
WEP & WPA Mandy Kershishnik.
Security and Wireless LANs
Wireless Gateway HDL-MCIP-RF02.10.
IEEE MAC Functionality
Wireless Networking Chapter 23.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Security Issues with Wireless Protocols
The RC4 Algorithm Network Security.
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Presentation transcript:

1999 Cabletron Systems

Wireless Networking RoamAbout Security, FCC Regulations, and Safety inherent security Wired Equivalent Privacy (WEP) FCC guidelines

1999 Cabletron Systems Wireless Networking RoamAbout Network Name and Association In this scenario, the only station in this cell that will be able to associate with the AccessPoint is station B AccessPoint Station A Network Name: sales Station B Network Name: admin

1999 Cabletron Systems Wireless Networking RoamAbout Authentication Stations must first authenticate with an AccessPoint before they can associate with it IEEE defines: –Open System Authentication –Shared Key Authentication (based on Wired Equivalent Privacy (WEP))

1999 Cabletron Systems Wireless Networking RoamAbout Open System Authentication In open system mode, station A makes an open system Authentication request to the associated AccessPoint Authentication request (Open System Authentication) Station A AccessPoint

1999 Cabletron Systems Wireless Networking RoamAbout AccessPoint responds and authentication is complete –Note: This mode of operation, although secure for the most part, is not as secure as operating with Wired Equivalent Privacy (WEP) installed Open System Authentication Authentication response (Open System Authentication) Station A AccessPoint

1999 Cabletron Systems Wireless Networking RoamAbout Encryption RoamAbout offers encryption to meet security concerns –Base 40 bit encryption –Optional 128 bit encryption –Encryption based on RC4 (1988 RSA algorithm) –Used by Netscape, Microsoft, Oracle and Lotus (80 million users) –The encryption is used in a shared key format which is used to: Encrypt a challenge text string by the end station and To decrypt the challenge text string response by the AccessPoint

1999 Cabletron Systems Wireless Networking RoamAbout Station makes a shared key authentication request Shared Key Authentication (WEP) Authentication Request Station A AccessPoint

1999 Cabletron Systems Wireless Networking RoamAbout Shared Key Authentication (WEP) AccessPoint replies with a “challenge” text string AccessPoint Challenge Text String Station A

1999 Cabletron Systems Wireless Networking RoamAbout Shared Key Authentication (WEP) The station encrypts the challenge text string with the shared key and responds to the AccessPoint with the Encrypted challenge text string Encrypted challenge text response Station A AccessPoint

1999 Cabletron Systems Wireless Networking RoamAbout The AccessPoint decrypts the encrypted challenge text and makes a decision to authenticate the station based on the results –Positive results in association –negative results in no association Shared Key Authentication (WEP) Positive or Negative response Station A AccessPoint

1999 Cabletron Systems Wireless Networking RoamAbout FCC Regulations Licensing –The requirements are such that as long as the manufacturer adheres to the regulations, a site license is NOT required by the end user Power requirements –USA 1 Watt from any omni-directional radio antenna 4 watts from any amplified antennas –Europe 100mWats from any source

1999 Cabletron Systems Wireless Networking RoamAbout FCC Channel Distribution MHz 2484 MHz ISM Band Channel number Top of channel Center frequency Bottom of channel

1999 Cabletron Systems Wireless Networking RoamAbout ETSI (Europe) Channel Distribution MHz 2484 MHz ISM Band Channel number Top of channel Center frequency Bottom of channel

1999 Cabletron Systems Wireless Networking RoamAbout Channel Distribution Worldwide Channel IDETSIFCCFranceJapan Cabletron AccessPoint Default channels