BY MOHAMMED ALQAHTANI (802.11) Security. What is 802.11 ? IEEE 802.11 is a set of standards carrying out WLAN computer communication in frequency bands.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
CSG357 Dan Ziminski & Bill Davidge 1 Effective Wireless Security – Technology and Policy CSG 256 Final Project Presentation by Dan Ziminski & Bill Davidge.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Security Awareness Chapter 5 Wireless Network Security.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
802.1x EAP Authentication Protocols
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Protected Extensible Authentication Protocol
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
ECE 578: COMPUTER NETWORK AND SECURITY
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
WIRELESS LAN SECURITY Using
Wireless and Security CSCI 5857: Encoding and Encryption.
Wireless Networking.
Wireless Networks Tamus, Zoltán Ádám
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Presented by: Dr. Munam Ali Shah
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WEP Protocol Weaknesses and Vulnerabilities
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Networking Network Classification, by there: 3 Security And Communications software.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Port Based Network Access Control
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Security of a Local Area Network
Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella.
Wireless LAN Security 4.3 Wireless LAN Security.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Presentation transcript:

BY MOHAMMED ALQAHTANI (802.11) Security

What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands standards are created by the IEEE Standards Committee (IEEE 802). Peer-to-peer or via access point It is used in most wireless network, in public WLAN i.e. Airports, hotels, coffee shops and private WLAN. 12/9/2009 (802.11) Security 2

Types of IEEE IEEE (1997) IEEE a(1999) IEEE b(1999) EEE g(2003 ) IEEE n(currently) 12/9/2009 (802.11) Security 3

Types of IEEE Con’t IEEE c :Developing the interoperability between devices IEEE d : Support the roaming IEEE e :Developing QoS IEEE f : to adjust inter-AP hand offs IEEE i : Developing WLAN security 12/9/2009 (802.11) Security 4

How it works authentication and make association with client to the access point must be set prior to communicating 1. Authentication: communications between a supplicant “software on a client device”, authenticator (guard)” wireless access point –AP”, and authentication server “server uses RADIUS and EAP protocols. 2. The supplicant must identity itself to be validated and authorized by sending request message “user name / password / digital certificate “ to the authenticator. 3. -Tithe authenticator forwards the message to the authentication server to verify. If the information was valid similer to the cop in the database the supplicant access to resources located on the network. 12/9/2009 (802.11) Security 5

Vulnerabilities AND Risks Key distribution problem : Shared key “everyone has the same key. Easy to guess the password if it was generated by the key. WEP with its known Weak encryption. Insertion attack : 1. Unauthorized AP on legitimate networks. 2. Unauthorized clients “i.e. war driving. Denial Jamming of service: (,flood bogus, radio frequency ). 12/9/2009 (802.11) Security 6

Vulnerabilities AND Risks 2 Interception and monitoring of wireless traffic : 1. In WALN must be in the range of WLAN. 2. Sniffing : usually happens in first part of the session “password / user name ”. 3. If an attacker get to AP, the attacker can have all the traffic because of broadcasting on WLAN to each hub. 4. Evil Twin : An attacker Laure clients to connect to another the network by creating unauthorized AP nearby the wireless clients,so the user get access to the attacker’s servers. The clinte might send out some significant info. 5. Using the traffic : possibly get traffic into a connection “commands on behalf of a trusted user to hijack session. 12/9/2009 (802.11) Security 7

Vulnerabilities AND Risks 3 ad hoc mode attacks : in Client-to-client Misconfiguration in SSID : all clintes in the AP have the same SSID to communicate. Mostly acts as a single key or password so that it is weak protection. 12/9/2009 (802.11) Security 8

What to do to solve Sharing the files as less as you can. Using WEP Encryption even it is weak but to make it harder to attack. Set the AP with Password. Using MAC address for allowing the Access and control connection. The SSID : not to broadcast if it’s possible. Avoid setting AP nearby the walls. Using RADIUS “Remote Authentication Dial In User Service ”. Don’t use non-upgradable equipment, to catch up with updates. Use NetStumbler to figure out if there is an illegal AP is founded. Set AP in DMS, create VPN tunnel to get into your network. 12/9/2009 (802.11) Security 9

What to do to solve There some useful in the implemented internet. 12/9/2009 (802.11) Security 10

References Wireless LAN Security, /Wi-Fi : Your Wireless Network has No Clothes : Wireless Network Security , Bluetooth and Handheld Devices : /9/2009 (802.11) Security 11

Questions 12/9/2009 (802.11) Security 12