Upload
gwenda-wright
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
Communication System Design, KTH
1
Security And Availability For Wireless Communication
OrganizationPost & Telestyrelse : Anders Rafting
Coach : Lars Adolfsson
Co-Coach : Fredrik Lilieblad
Mehdi Ghasemi
Project Manager
Windows master
HiperLAN
Xiaodong Hu
Website and documents
Bluetooth
Yvonne Grunnevall
Video presentation
IEEE802.11
Communication System Design, KTH
2
Goals
What is Wireless Local Area Network? HiperLAN, IEEE 802.11a, b, Bluetooth
What is Wireless Security? Threats in wireless LAN
Security implementations in those standards
IP-Roaming
SWOT Analyze
Presentation disposition
Security And Availability For Wireless Communication
Communication System Design, KTH
3
Classifying security threats in WLAN
Solutions to the threats
Comparing HiperLAN, 802.11 and Bluetooth with each other
Seamless IP-RoamingSeamless IP-Roaming (Current state)(Current state)
Based on OS explore known security Based on OS explore known security risks with respect to IPrisks with respect to IP(Will work with in the near future)(Will work with in the near future)
Goals
Security And Availability For Wireless Communication
Communication System Design, KTH
4
What is WLAN (Wireless Local Area Network) ?
Security And Availability For Wireless Communication
Communication System Design, KTH
5
HiperLAN/2,IEEE 802.11 and Bluetooh
Security And Availability For Wireless Communication
Communication System Design, KTH
6
What is WLAN Security?
Security And Availability For Wireless Communication
Communication System Design, KTH
7
Threats in Wireless Communication
1. Passive attacks
2. Active attacks
Security And Availability For Wireless Communication
Communication System Design, KTH
8
Threats in Wireless Communication
Passive attacks
Eavesdropping (sniffering)
Security And Availability For Wireless Communication
Communication System Design, KTH
9
Threats in Wireless Communication
Active attacks
1.1. Social EngineeringSocial Engineering
2.2. ImpersonationImpersonation
3.3. ExploitsExploits
4.4. Data DrivenData Driven
5. Transitive Trust
6. Infrastructure
7. Denial of Service
Security And Availability For Wireless Communication
Similar in Wired & Wireless Communication
Communication System Design, KTH
10
IEEE 802.11: WEP (Wired Equivalent privacy) SSID (service set identifiers ) MAC address filtering
Bluetooth: AuthorizationAuthenticationEncryption
HiperLAN: Authentication Encryption
Security Implementation in HiperLAN, IEEE 802.11, Bluetooth
Security And Availability For Wireless Communication
Communication System Design, KTH
11
Mobile IP
Wireless VPN (Virtual Private Network)IP Mobility
Session Mobility
IP-Roaming
Security And Availability For Wireless Communication
Communication System Design, KTH
12
StrengthsWhat to do about this
WeaknessWhat to do about this
OpportunitiesWhat to do about this
ThreatsWhat to do about this
SWOT Analysis
Security And Availability For Wireless Communication
Communication System Design, KTH
13
Small group
Easy communications
Easy scheduling
Good relationship with our team coach
Are able to work even more and harder
Interest of new technologies
Strengths
Security And Availability For Wireless Communication
Communication System Design, KTH
14
What to do about it?
Utilize the strengths efficiently
Security And Availability For Wireless Communication
Communication System Design, KTH
15
Weakness
Small group
Much work
No motivation
Security And Availability For Wireless Communication
Communication System Design, KTH
16
How can we overcome the weakness?
Working more
Being flexible to manage and accepting new tasks
Sharing the tasks equally among the members
Group meeting
Social activities
Security And Availability For Wireless Communication
Communication System Design, KTH
17
Working with a real-world project
Useful for Swedish government and community
Contacts with companies and authorities
Knowledge about new technique
Knowledge about new cultures
Opportunities
Security And Availability For Wireless Communication
Communication System Design, KTH
18
What to do about it?
Being smart and taking advantages of them
Security And Availability For Wireless Communication
Communication System Design, KTH
19
Threats
Lack of knowledge
Co-operation difficulties
Not useful technology (hiperlan/2)
Assignments effecting the quality of the project
Security And Availability For Wireless Communication
Communication System Design, KTH
20
What to do about it?
Being aware of the threats
Meeting with the Principal and the Coach
Security And Availability For Wireless Communication
Communication System Design, KTH
21
3 things to get from others
Project 1: Internet Scalability Problems with interference from WLAN (802.11, Hiperlan/2)
Project 4: Privacy in IPv6 Mobile IPv6. IPsec
Project 17: (m)IP/(WLAN,GPRS) Roaming in wireless infrastructure
Security And Availability For Wireless Communication
Communication System Design, KTH
22
3 things to offer to others
WLAN,HiperLAN, Bluetooth Security issues, Weakness and Strength
IP-Roaming Security issues, Wireless VPN, IP Mobility and Session Mobility
Security in wireless VPN Security issues, IP Mobility and Session Mobility
Security And Availability For Wireless Communication
Communication System Design, KTH
23
Thank you for listening
Questions?
Security And Availability For Wireless Communication