Perceptions of Wi-Fi Security Requirements: A Stratified View Merrill Warkentin Xin (“Robert”) Luo Mississippi State University.

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
WiMAX CS441 Dr. Kemal Akkaya 12/8/2011 By: Chun-Cheng Chuang.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Fidelity (Wi-Fi)
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Wireless Infrastructures Wireless. Wireless Infrastructures Wireless LAN Predominantly IEEE A, B, G, N Wireless MAN WiMax and its.
Mobile and Wireless Communication Security By Jason Gratto.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless Networking.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
WiMAX, meaning Worldwide Interoperability for Microwave Access Emerging technology that provides wireless transmission of data using a variety of transmission.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Lecture 11 Wireless security
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
April 11, 2007 Healthcare Engineering Course Online 1 Wireless Internet Shigeki Goto Waseda University.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
1 Wi-Fi, Wireless Broadband, Sensor & Personal Area Networks –Standards –Applications Broadband Wireless Access –WiMAX –Adapting 3G for WBA: UMTS.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Authentication and handoff protocols for wireless mesh networks
CompTIA Security+ Study Guide (SY0-401)
Wireless Protocols WEP, WPA & WPA2.
Wireless LAN Security 4.3 Wireless LAN Security.
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Providing Teleworker Services
Presentation transcript:

Perceptions of Wi-Fi Security Requirements: A Stratified View Merrill Warkentin Xin (“Robert”) Luo Mississippi State University

The authors Samuel Luo !

Overview Growth in Access Points – the problem Existing and emerging protocols Security threats Perception of Wi-Fi security threats Research plan Discussion

Access Points Found (Worldwide Wardrive,2004) Total AP found in WWD4: 228,537 1 = Sept = June 2004

Existing & Emerging Protocols , a, b, g Four standards for Wireless LANs Ranging from 1M to 54M bit/sec. EAP – Extensible Authentication Protocol e QoS (quality of service) h Power usage and transmission power n Improve the bandwidth f inter access point s Mesh networking r fast roaming

Security Protocols: WEP and WPA WEP relies on unchanging, shared encryption keys addresses confidentiality instead of authentication WPA (early version of the i) includes Temporal Key Integrity Protocol (TKIP) and 802.1x mechanisms provide dynamic key encryption and mutual authentication poorly chosen short human-readable passphrases can be cracked with a robust dictionary attack offline and without access to the network.

Interoperable Protocols Interoperability problem Cisco’s proprietary version of 801.1x authentication--the Lightweight EAP (LEAP)  doesn’t function with a variety of hardware clients Protected EAP (PEAP)  combining an administrator-specified authentication and confidentiality protocol with EAP Adoption problem most organizations reluctant to embrace standards that have yet to be standardized

Security Threats Viruses and Trojans Eavesdropping Man-in-the-middle attacks Denial of Service attacks

Top Seven Security Problems 1. Easy Access 2. Rogue Access Points 3. Unauthorized Use of Service 4. Service/Performance Constraints 5. MAC Spoofing, Session Highjacking 6. Traffic Analysis and Eavesdropping 7. Higher Level Attacks Source: Bitpipe

IEEE i Security Protocol ratified in June 2004 WPA2 with Advanced Encryption Standard (AES) address all known WEP deficiencies via a new mode called CCM provide confidentiality and integrity bring stronger encryption reduce key management overhead minimize the time spent computing key schedules (Cam-Winget, 2003)

Wi-Max broadband wireless connections over long distances used for "last mile" broadband connections hotspot and cellular backhaul high-speed enterprise connectivity based on IEEE standard provides metropolitan area network connectivity at speeds of up to 75 Mb/sec can transmit signals as far as 30 miles (average = 3-5 miles) Source: Intel

Stakeholder Groups executive-level (top) management IT Directors (CIO, CSO, Netword Admins) staff, end users other stakeholders? (external) Research Question: “Do they have the same perceptions of Wi-Fi security?”

Perceptions of Wi-Fi Security Is it safe? Who can read? How to use? Each stakeholder group has influences. Who views as secure? How does this influence actions?

Research Plan investigate similarities and dissimilarities in terms of perception of wireless security issues among stakeholder groups discuss implications of any differences research methodology lit review, develop research hypotheses survey – pilot study (at MSU)  deans, directors, IT directors, faculty, staff, students survey – hospitals, hotels, cafes, etc.

Stakeholder Discussion