Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.

Slides:



Advertisements
Similar presentations
INTRODUCTION TO Wi-Fi TECHNOLOGY.
Advertisements

Networking at Home and Abroad
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
1 Ultrawideband Contents Introduction Why Ultrawideband UWB Specifications Why is UWB unique Data Rates over range How it works UWB Characteristics Advantages.
Wireless Network Taxonomy Wireless communication includes a wide range of network types and sizes. Government regulations that make specific ranges of.
Wireless Security.
Wireless Network Layout What Is A Wireless Network Anatomy Of A Wireless Network Reasons To Go Wireless WI-FI Standard Wireless Application Wireless VS.
Networks Olga Agnew Bryant Likes Daewon Seo.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Bluetooth Network Prepared By: Sara Ayad Aldehany.
Fundamental of wireless network.  Heinrich Hertz discovered and first produced radio waves in 1888 and by 1894 the modern way to send a message over.
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
© 2009 Pearson Education, Inc. Publishing as Prentice Hall Chapter 5 Updated January 2009 Raymond Panko’s Business Data Networks and Telecommunications,
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 6 1 Real-Time Communication on the Internet Exploring Wireless Networks Tutorial.
To: Mr Riche By: Brittany Bennett.  Bluetooth is an open wireless technology standard for exchanging data over short distances (using short wavelength.
Communications Channel & transmission media
BTEC National Unit 25 Data communications and networks.
Area 2 Computers & Technology Group 21 August 2008 Dean Steichen Br.#8.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
LANs and WANs Coatbridge High School Computing Department.
Differences between Bluetooth and wifi :.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Wide Area Networks Vedant Saran. What is WAN?  A Wide Area Network(WAN) is a network that spreads over a large area such as office companies in different.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Wireless Communication Methods
Telecommunications and wireless FAQ (VVSG & VSS2002)
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
A PRESENTATION ON “Wireless Networks”
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
WIFI. What is wifi ? Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
WIRELESS Communication Automation Control. Wireless = Efficiency Performance: Performance: –Space Efficiency: Efficiency. = #receptors / box area –Unlimited.
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
SEMINAR ON BLUETOOTH TECHNOLOGY
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 7B Data Communications.
Topic : 4.0 WIRELESS TECHNOLOGIES.  Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless.
Wireless Communication
21 st november  Iphone – texting-internet-apps- when texting it sends wirelessly to the reciver  Laptop-downloading-internet- it travels using.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Wireless Communications Standard ‘wired’ networks are connected together using copper cables that carry data around the network in the form of electrical.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
S305 – Network Infrastructure Chapter 6 Local Area Network.
Wireless security. Submitted To: Er. S.K. Soni [Dy. Head,CSE] Submitted By: Gurjeet Barar CSE Branch IV Year(VII sem) A-2 Batch JODHPUR INSTITUTE OF ENGINEERING.
ICT Unit 4: Network and the effects of using them
Objective of this Presentation To understand what is Wi-Fi and what is Bluetooth. Difference between Bluetooth and Wi-Fi.
BLUETOOTH TECHNOLOGY Submitted by: Kusham Lata Bindu Grover Submitted To: NIIT(Sirsa)
Chapter 1: Wireless Networking/Technology. Wireless Networking Definition: –the technologies that enable computers to communicate using standard network.
Wi-Fi Brandon & Jiayang. What is Wi-Fi? Wi-Fi (wireless fidelity) is a wireless networking technology that allows devices to communicate without wires.
Wi-Fi Technology.
Wireless Technologies
Bluetooth By.
Three types of wireless technology
Wireless LAN 第一組 電機四 林長寬 B /11/24.
By Markus Kriechhammer
Networking 101.
Presentation transcript:

Wireless Security

Traditional method A computer with network card a cable connecting network card and the network

Wireless technology at home Infrared (IR) or Radio transmission e.g. remote control, cordless computer keyboards and mouse, stereo headsets Short distance, simple signals

Wireless connection Access point with cable connection to the network IEEE wireless LAN card

Figure 1: Mobile Devices

IEEE802.11x standards Developed by IEEE (Institute of Electronic and Electrical Engineers) Have many standards (e.g. IEEE802.11a, IEEE802.11b,IEEE802.11g, etc) Began in 1990 Took 7 years to complete the first standard

Products available in the Market Only products of three standards IEEE802.11b First product in the market IEEE802.11a and IEEE802.11g arrive almost simultaneously IEEE802.11n finalized in 2010

comparison IEEE b IEEE g IEEE a IEEE n (Draft) speed11 Mbps54 Mbps 300Mbps Frequency2.4 GHz 5 GHz 2.4 GHz Advantages Popular inexpensive Compatible with IEEE802.11b Avoid interference with other devices (such as cordless phones, microwave oven) Faster than version b and g Compatible with b and g

Bluetooth Low-cost, low-power Cover 10 meters Max speed: 700 Kbps. Use 2.4 GHz radio frequency Not a competitor of IEEE Replace cables in short distance

User Knowledge Lack of security features in mobile devices Immature wireless technology Security features not turned on Users unaware of security problems

Eavesdropping Figure 2 Eavesdropping by attacker

Program downloading Small memory More often to download program

Eavesdropping Difficult to discover Can use ordinary mobile device to attack (e.g. notebook computer) Software available in public domain Can attack from 20 miles away

Potential thread of download programs Reading or writing files (such as passwords) on the devices Delete files Connecting to other computers or devices perform illegal operations (such as hacking)

Jamming

Steps in jamming Listen to communication first Collect information Break the communication Impersonate the jammed user to continue communication Or impersonate the server

Jamming

Man-in-the-middle Listen to communication Intercepts the message Modify or add data in the message Confidential and integrity problem

Identity of attacker Mobile device is small (e.g. PDA) Difficult to detect Difficult to locate the attacker