Upload
nhi
View
39
Download
0
Embed Size (px)
DESCRIPTION
ITEC810. Securing WLANs and WMANs. Securing Wireless LANs and Wireless MANs. By Peter Nicola Supervisor: Dr. Michael Hitchens. Securing WLANs and WMANs. Agenda. What is it about? WLAN WMAN Conclusion. Securing WLANs and WMANs. What is it about?. - PowerPoint PPT Presentation
Citation preview
SECURING WIRELESS LANS AND WIRELESS MANS
By Peter NicolaSupervisor: Dr. Michael Hitchens
ITEC810
SECURING WLANS AND WMANS
2
SECURING WLANS AND WMANS
What is it about?
WLAN
WMAN
Conclusion
AGENDA
3
The world is moving from Wired to Wireless Networking.
Two forms of Wireless Networking are discussed
The need to secure them
WLAN WMAN
SECURING WLANS AND WMANSWHAT IS IT ABOUT?
4
What is it about?
WLANs
WMANs
Conclusion
SECURING WLANS AND WMANSAGENDA
5
What is it?
Security Approaches Algorithms
Other approaches
WEP
WPA
WPA2
MAC FilteringSSID Broadcast
SECURING WLANS AND WMANSWLAN
6
Evil Twin War Driving
SECURING WLANS AND WMANSWLAN
THREATS
SSID: Macquarie University
Replicated SSID: Macquarie University
7
War Driving
SECURING WLANS AND WMANSWLAN
Weakly or not Secured
Well SecuredGoogle Maps
www.wifimaps.com
8
War DrivingSECURING WLANS AND WMANSWLAN
Search Result in Australia Search Result Worldwide
9
OUTCOME
SECURING WLANS AND WMANSWLAN
Keep them secured
Possible Improvements
Algorithm Used
Key Complexity
SSID Choice - HidingMAC Filtering
Digital IDs
Embedded Hardware Encryption
Management Software
10
What is it about?
WLANs
WMANs
Conclusion
SECURING WLANS AND WMANSAGENDA
11
What is it?
Security Approaches
PKM (Privacy Key Management)
Other approaches
AK and TEK 3DES & X.509
DOCSIS usageLessons learned from WLAN
SECURING WLANS AND WMANSWMAN
12
No PHY layer protection One Way Authentication
SECURING WLANS AND WMANSWMAN
THREATS AND VULNERABILITIES
Jamming and DoS
13
SECURING WLANS AND WMANSWMAN
One Way Authentication
BS
SS
Certificate
Cryptographic capabilities, …
AK (valid for 1 70 days)
Key Request
TEK (valid for 12 hours 7 days)
User Traffic
So, what is the problem?
14
OUTCOME
SECURING WLANS AND WMANSWMAN
What can be Improved? Mutual Authentication
Physical Layer Protection
Shorter Key Life
How do BSs authenticate each other?
15
What is it about?
WLANs
WMANs
Conclusion
SECURING WLANS AND WMANSAGENDA
16
Wide usage of Wireless Networks
Perfect security does not exist
Operators are encouraged to know what threats are there, and how to be secured against them
There is always a room for improvements
SECURING WLANS AND WMANSCONCLUSION
17
Thanks for your attention
SECURING WLANS AND WMANSTHANKS
Any Questions?