Wireless LANs: outline. wireless and WiFi security: WEP, i, WPA, WPA2. networking security wireless ad-hoc and mesh networks

Similar documents
ICS 351: Today's plan. DNS WiFi

Chapter 10: Wireless LAN & VLANs

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

The Wi-Fi Boom. Dr. Malik Audeh Tropos Networks March 13, 2004

Public Wireless LAN Service.

Attack & Defense in Wireless Networks

Wireless technology Principles of Security

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs

CS263: Wireless Communications and Sensor Networks

WIRELESS SENSOR NETWORK

M a/b/g Outdoor Layer-2 MESH AP

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Wireless Router at Home

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS


Chapter 7. Basic Wireless Concepts and Configuration. Part I

Wireless Technologies

Wi-Fi - Why for? A Word About Spectrum. I T I n f r a s t r u c t u r e S o l u t i o n s

Configuring WEP and WEP Features

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Data and Computer Communications. Chapter 13 Wireless LANs

54M Wireless LAN CardBus Card

Last Lecture: Data Link Layer

Configuring Cipher Suites and WEP

Wireless Local Area Networks (WLANs) Part I

WNC-0300USB. 11g Wireless USB Adapter USER MANUAL

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

USB Wireless Network Adapter User s Manual

Naveen Kumar. 1 Wi-Fi Technology

Green Lights Forever: Analyzing the Security of Traffic Infrastructure

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)

Overview : Computer Networking. Spectrum Use Comments. Spectrum Allocation in US Link layer challenges and WiFi WiFi

802 Wireless Access Techniques Overview

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

Overcoming Concerns about Wireless PACs and I/O in Industrial Automation

WiFi Coverage Charter

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Overview of Wireless LANs

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Basic Wireless Settings on the CVR100W VPN Router

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Wireless Attacks and Countermeasures

Wireless Networking Basics. Ed Crowley

LEARN. Here is a simple step by step to get the most out of inssider:

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs

CSCI-1680 Wireless Rodrigo Fonseca

CSCD 433/533 Advanced Networking

Temporal Key Integrity Protocol: TKIP. Tim Fielder University of Tulsa Tulsa, Oklahoma

Contents. NP G Wireless PC Card User Guide

Wireless# Guide to Wireless Communications. Objectives

Wi-Fi Scanner. Glossary. LizardSystems

Wireless Network Security Spring 2011

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless Network Security

EnGenius EAP-9550 Indoor Access Point

SpeedStream. Wireless PCI Adapter User s Manual. Model SS1024. Part No

Managing Rogue Devices

Chapter 5 Local Area Networks. Computer Concepts 2013

WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

IEEE Romel Rudyard J. Lucentales, ECE 5

MTA_98-366_Vindicator930

Client QoS Association Settings on the WAP371

CP-WU8700/CP-WX8750/CP-X8800 CP-WU8600/CP-WX8650

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

Chapter 3 Wireless Configuration

Networks and Telecommunication

802.11ac Wireless Access Point Model WAC104

Wireless Security Security problems in Wireless Networks

CHAPTER TWO LITERATURE REVIEW

Worldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Architecture. Copyright :I1996 IEEE. All rights reserved. This contains parts from an unapproved draft, subject to change

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

CWNP PW Certified Wireless Analysis Professional. Download Full Version :

ICS 351: Networking Protocols

1.9 GHz DECT 6.0: The New Standard in Wireless Technology > > > > W H I T E P A P E R

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Computer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University

Chapter 16 Networking

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7

1. INTRODUCTION. Wi-Fi 1

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Network Media and Layer 1 Functionality

Guide to Wireless Communications, Third Edition. Objectives

Broadband Hamnet What is it?

"OUT OF PRINT" F4i11 HEWLETT ~~PACKARD. HIPERLAN An Air Interface Designed for Multi-Media

Networking Basics. Crystal Printer Network Installation Guidelines

Case study of Wireless Technologies in Industrial Applications

An IEEE static mesh network design for isolated rural areas in developing regions

Transcription:

Wireless LANs: outline wireless 802.11 and WiFi. 802.11 security: WEP, 802.11i, WPA, WPA2. networking security wireless ad-hoc and mesh networks

ISM bands to operate most radios, a license is needed from a government body (in the U.S., the FCC) to operate a microwave oven, no license is needed microwave ovens work on a resonant frequency of water, 2.4GHz the 2.4GHz-2.5GHz band has been designated an Industrial, Scientific, and Medical (ISM) band, free to use worldwide without a license as long as transmission power is limited and some countries restrict part of this band

Using ISM bands ISM equipment needs to tolerate interference (e.g., from microwave ovens!) there are many ISM bands, but most are limited to only some countries e.g. 900MHz band only available in the Americas due to the unprecedented availability of the 2.4GHz ISM band, many applications have been developed for it

Wireless 802.11/WiFi an early marketing term for 802.11 was WiFi a pun on HiFi, High Fidelity audio equipment 802.11 works mostly in the 2.4GHz ISM band, though 802.11a works in the 5GHz band many successive standards: 802.11 (1-2Mb/s) 802.11a (54Mb/s) 802.11b (11Mb/s) 802.11g (54Mb/s) foreseeably, future versions

802.11/WiFi Operation 802.11 has two modes: ad-hoc (point-to-point) and managed in managed mode, all communication is to or from a central access point end-nodes contend for the medium: this contention may result in collisions that require retransmissions

802.11 Security: WEP tapping a wired network requires physical access to the wires tapping a wireless network requires being in range of the signal originally, cryptographic Wired Equivalent Privacy (WEP) was introduced to hide the contents of the messages the original design for WEP was not widely published unfortunately, this resulted in a lack of serious examination of the protocol: security by obscurity often does not work

802.11 Security: WPA and WPA2 unfortunately, WEP is sufficiently weak that it can be cracked by listening to a few minutes of busy traffic 802.11i introduced: WiFi Protected Access (WPA), a simple but much stronger encryption protocol, and WPA2, stronger than WPA and requiring more resources for implementation (including, in some cases, newer equipment)

networking security "in the clear" protocol can be easily broken when information is snooped: telnet, ftp, http, many email protocols encrypted protocols are secure against many attacks, including someone examining the data: ssh/scp, https, secure POP/IMAP, PGP most protocols are not secure against traffic analysis host security is more concerned with installing applications, running foreign code, firewalls/nats, etc

security principles it is usually better to have more security than less security security that inconveniences users is more likely to be resisted or circumvented security can lock out people who should have access data requiring security should not be sent unencrypted over the Internet because some of the links may be accessible to adversaries data requiring security is still often sent unencrypted over the Internet though data with monetary value is usually protected these days

wireless ad-hoc networks using the ad-hoc mode of 802.11, any machine ("node") may directly talk to any other node if nodes agree to forward data for each other, they can form a wireless ad-hoc network machines may move or go to sleep, so routing can be challenging also, the notion of a "link" is different for wired and wireless networks: successful wireless protocols take advantage of broadcasting generally machines should discover each other and automatically send data to the destination

wireless mesh networks a wireless mesh network consists of static wireless nodes possibly with some wired nodes coordinating to provide Internet access mobile nodes may obtain Internet access from nodes in a mesh network