Presentation is loading. Please wait.

Presentation is loading. Please wait.

S ECURING W IRELESS LAN S AND W IRELESS MAN S By Peter Nicola Supervisor: Dr. Michael Hitchens ITEC810 S ECURING WLAN S AND WMAN S.

Similar presentations


Presentation on theme: "S ECURING W IRELESS LAN S AND W IRELESS MAN S By Peter Nicola Supervisor: Dr. Michael Hitchens ITEC810 S ECURING WLAN S AND WMAN S."— Presentation transcript:

1 S ECURING W IRELESS LAN S AND W IRELESS MAN S By Peter Nicola Supervisor: Dr. Michael Hitchens ITEC810 S ECURING WLAN S AND WMAN S

2 What is it about? WLAN WMAN Conclusion 2 A GENDA

3 The world is moving from Wired to Wireless Networking. Two forms of Wireless Networking are discussed The need to secure them 3 WLAN WMA N S ECURING WLAN S AND WMAN S W HAT IS IT ABOUT ?

4 What is it about? WLANs WMANs Conclusion 4 S ECURING WLAN S AND WMAN S A GENDA

5 What is it? Security Approaches 5 Algorithms Other approaches WEP WPA WPA2 MAC Filtering SSID Broadcast S ECURING WLAN S AND WMAN S WLAN

6 6 Evil TwinWar Driving S ECURING WLAN S AND WMAN S WLAN T HREATS SSID: Macquarie University Replicated SSID: Macquarie University

7 7 War Driving S ECURING WLAN S AND WMAN S WLAN Weakly or not Secured Well Secured Google Maps www.wifimaps.com

8 8 War Driving S ECURING WLAN S AND WMAN S WLAN Search Result in AustraliaSearch Result Worldwide

9 9 O UTCOME S ECURING WLAN S AND WMAN S WLAN Keep them secured Possible Improvements Algorithm Used Key Complexity SSID Choice - Hiding MAC Filtering Digital IDs Embedded Hardware Encryption Management Software

10 What is it about? WLANs WMANs Conclusion 10 S ECURING WLAN S AND WMAN S A GENDA

11 What is it? Security Approaches 11 PKM (Privacy Key Management) Other approaches AK and TEK3DES & X.509 DOCSIS usage Lessons learned from WLAN S ECURING WLAN S AND WMAN S WMAN

12 12 No PHY layer protection One Way Authentication S ECURING WLAN S AND WMAN S WMAN T HREATS AND V ULNERABILITIES Jamming and DoS

13 13 S ECURING WLAN S AND WMAN S WMAN One Way Authentication BS SS Certificate Cryptographic capabilities, … AK (valid for 1  70 days) Key Request TEK (valid for 12 hours  7 days) User Traffic So, what is the problem?

14 14 O UTCOME S ECURING WLAN S AND WMAN S WMAN What can be Improved? Mutual Authentication Physical Layer Protection Shorter Key Life How do BSs authenticate each other?

15 What is it about? WLANs WMANs Conclusion 15 S ECURING WLAN S AND WMAN S A GENDA

16 Wide usage of Wireless Networks Perfect security does not exist Operators are encouraged to know what threats are there, and how to be secured against them There is always a room for improvements 16 S ECURING WLAN S AND WMAN S C ONCLUSION

17 Thanks for your attention 17 S ECURING WLAN S AND WMAN S T HANKS Any Questions?


Download ppt "S ECURING W IRELESS LAN S AND W IRELESS MAN S By Peter Nicola Supervisor: Dr. Michael Hitchens ITEC810 S ECURING WLAN S AND WMAN S."

Similar presentations


Ads by Google