17
SECURING WIRELESS LANS AND WIRELESS MANS By Peter Nicola Supervisor: Dr. Michael Hitchens ITEC810 SECURING WLANS AND WMANS

Securing Wireless LANs and Wireless MANs

  • Upload
    nhi

  • View
    39

  • Download
    0

Embed Size (px)

DESCRIPTION

ITEC810. Securing WLANs and WMANs. Securing Wireless LANs and Wireless MANs. By Peter Nicola Supervisor: Dr. Michael Hitchens. Securing WLANs and WMANs. Agenda. What is it about? WLAN WMAN Conclusion. Securing WLANs and WMANs. What is it about?. - PowerPoint PPT Presentation

Citation preview

Page 1: Securing Wireless LANs and Wireless MANs

SECURING WIRELESS LANS AND WIRELESS MANS

By Peter NicolaSupervisor: Dr. Michael Hitchens

ITEC810

SECURING WLANS AND WMANS

Page 2: Securing Wireless LANs and Wireless MANs

2

SECURING WLANS AND WMANS

What is it about?

WLAN

WMAN

Conclusion

AGENDA

Page 3: Securing Wireless LANs and Wireless MANs

3

The world is moving from Wired to Wireless Networking.

Two forms of Wireless Networking are discussed

The need to secure them

WLAN WMAN

SECURING WLANS AND WMANSWHAT IS IT ABOUT?

Page 4: Securing Wireless LANs and Wireless MANs

4

What is it about?

WLANs

WMANs

Conclusion

SECURING WLANS AND WMANSAGENDA

Page 5: Securing Wireless LANs and Wireless MANs

5

What is it?

Security Approaches Algorithms

Other approaches

WEP

WPA

WPA2

MAC FilteringSSID Broadcast

SECURING WLANS AND WMANSWLAN

Page 6: Securing Wireless LANs and Wireless MANs

6

Evil Twin War Driving

SECURING WLANS AND WMANSWLAN

THREATS

SSID: Macquarie University

Replicated SSID: Macquarie University

Page 7: Securing Wireless LANs and Wireless MANs

7

War Driving

SECURING WLANS AND WMANSWLAN

Weakly or not Secured

Well SecuredGoogle Maps

www.wifimaps.com

Page 8: Securing Wireless LANs and Wireless MANs

8

War DrivingSECURING WLANS AND WMANSWLAN

Search Result in Australia Search Result Worldwide

Page 9: Securing Wireless LANs and Wireless MANs

9

OUTCOME

SECURING WLANS AND WMANSWLAN

Keep them secured

Possible Improvements

Algorithm Used

Key Complexity

SSID Choice - HidingMAC Filtering

Digital IDs

Embedded Hardware Encryption

Management Software

Page 10: Securing Wireless LANs and Wireless MANs

10

What is it about?

WLANs

WMANs

Conclusion

SECURING WLANS AND WMANSAGENDA

Page 11: Securing Wireless LANs and Wireless MANs

11

What is it?

Security Approaches

PKM (Privacy Key Management)

Other approaches

AK and TEK 3DES & X.509

DOCSIS usageLessons learned from WLAN

SECURING WLANS AND WMANSWMAN

Page 12: Securing Wireless LANs and Wireless MANs

12

No PHY layer protection One Way Authentication

SECURING WLANS AND WMANSWMAN

THREATS AND VULNERABILITIES

Jamming and DoS

Page 13: Securing Wireless LANs and Wireless MANs

13

SECURING WLANS AND WMANSWMAN

One Way Authentication

BS

SS

Certificate

Cryptographic capabilities, …

AK (valid for 1 70 days)

Key Request

TEK (valid for 12 hours 7 days)

User Traffic

So, what is the problem?

Page 14: Securing Wireless LANs and Wireless MANs

14

OUTCOME

SECURING WLANS AND WMANSWMAN

What can be Improved? Mutual Authentication

Physical Layer Protection

Shorter Key Life

How do BSs authenticate each other?

Page 15: Securing Wireless LANs and Wireless MANs

15

What is it about?

WLANs

WMANs

Conclusion

SECURING WLANS AND WMANSAGENDA

Page 16: Securing Wireless LANs and Wireless MANs

16

Wide usage of Wireless Networks

Perfect security does not exist

Operators are encouraged to know what threats are there, and how to be secured against them

There is always a room for improvements

SECURING WLANS AND WMANSCONCLUSION

Page 17: Securing Wireless LANs and Wireless MANs

17

Thanks for your attention

SECURING WLANS AND WMANSTHANKS

Any Questions?