Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication.

Slides:



Advertisements
Similar presentations
Network Security7-1 Chapter 7 Network Security Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
Advertisements

Encipherment Using Modern Symmetric-Key Ciphers. 8.2 Objectives ❏ To show how modern standard ciphers, such as DES or AES, can be used to encipher long.
Cryptography The science of writing in secret code.
Network Security Hwajung Lee. What is Computer Networks? A collection of autonomous computers interconnected by a single technology –Interconnected via:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
8: Network Security Security. 8: Network Security8-2 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Network Security – Part 1 Spring 2005 V.T. Raja, Ph.D., Oregon State University.
Network Security understand principles of network security:
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1 Last class r Ethernet r Hubs and Switches r Mobile and wireless networks, CDMA Today r CDMA and IEEE wireless LANs r Network security.
Review and Announcement r Ethernet m Ethernet CSMA/CD algorithm r Hubs, bridges, and switches m Hub: physical layer Can’t interconnect 10BaseT & 100BaseT.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Security Module – Part 1 Spring 2006 V.T. Raja, Ph.D., Oregon State University.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
University of Calgary – CPSC 441.  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against.
Encryption Methods By: Michael A. Scott
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Lecture 23 Cryptography CPE 401 / 601 Computer Network Systems Slides are modified from Jim Kurose & Keith Ross.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Network Security7-1 Chapter 8: Network Security Chapter goals: r understand principles of network security: m cryptography and its many uses beyond “confidentiality”
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 1: Principles of cryptography.
Network Security David Lazăr.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Network Security Basics. 2 Network Security Foundations: r what is security? r cryptography r authentication r message integrity r key distribution.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Network Security7-1 Today r Reminders m Ch6 Homework due Wed Nov 12 m 2 nd exams have been corrected; contact me to see them r Start Chapter 7 (Security)
+ Security. + What is network security? confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CS 453 Computer Networks Lecture 25 Introduction to Network Security.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
CPSC 441 TUTORIAL – APRIL 4, 2012 TA: MARYAM ELAHI NETWORK SECURITY.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Chapter 8: Network Security
Wireless Technologies
What is network security?
Chapter 8: Network Security
CS 457 – Lecture 7 Wireless Networks
Network Security Basics
Review and Announcement
Chapter 8: Network Security
Chapter 8: Network Security
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Wireless

Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication link Base station: Responsible for sending and receiving data (access point)

Standards LetterSpeedRangeFrequency No letter2 Mbps150 ft2.4 GHz A54 Mbps150 ft5 GHz B11 Mbps300 ft2.4 GHz G54 Mbps300 ft2.4 GHz N108 Mbps300 ft2.4 GHz

Range Limiters Cordless telephones Large electrical appliances such as refrigerators Fuse boxes, metal plumbing, metal studing and air conditioning units Sun spots

Not wired is… Decreasing signal strength Interference from other sources Multipath propagation (bounce)

Basic Service Set

MAC Protocol CSMA with collision avoidance: sense first, then send Collision avoidance (can’t send/receive at same time) Link-layer ACKs and retransmissions due to high bit-error rates

frames 3 address fields –Address 2 is MAC address of sending station (host or AP) –Address 1 is MAC address of destination –Address 3 is MAC address of router interface CRC value

We are still working on this question Answer is easy if hub is involved Switch has “learned” that H1 is in BSS1 and has to be “taught” to use BSS2

Wireless Security Configure a unique SSID then block transmission of it –Unique name is cute, but so what? –If you block transmission, network does not show up and no way to specify name Use MAC filtering. This one makes total sense Change administrator account name and password Why go the extra distance to use WPA2 if you have done the above?

Secure Communication Confidentiality: only the sender and intended receiver should be able to understand the contents of transmitted message Authentication: Both the sender and receiver shoul be able to confirm the identity of the other party Message integrity and nonrepudiation: Make sure message is not altered in transit Availability and access control: communication can occur in the first place – only lock out the “bad guys”

Cryptography Dates back to Julius Caesar Allow sender to disguise data so that an intruder can gain no information from the data intercepted Send ciphertext (not cleartext or plaintext) Symmetric key systems both keys are identical and are secret Public key systems use two keys. One is known (public); the other is known only by Alice or Bob

Symmetric Key Caesar cipher: substitute letter that is k letters removed (alphabet wraps) Monoalphabetic cipher: substitute random letter for letter (fixed chart) Polyalphabetic encryption: two or more mono’s with a random C1,C2,C2,C1 pick pattern

DES Data Encryption Standard Encodes plaintext in 64-bit chunks using a 64-bit key (8 bits are odd parity bits; 56 bits long) Two (first and last steps) permutation steps; 16 identical steps in the middle How well does it work? No one knows for sure. First crack was 4-months, then 22 hours

3DES Encrypt with one key; decrypt with second key; encrypts with third key Advanced Encryption Standard (AES): processes data in 128-bit blocks using keys that are 128, 192 and 256 bits long

A core problem Both sides have to know secret key How is this key communicated? Verified? Alternative is the idea of a public key

Public Key Cryptography Bob has two keys: one public and one private to him Alice gets Bob’s public key; encrypts message Bob then decrypts message using private key Does this make sense?