Upload
myrtle-hunt
View
213
Download
1
Embed Size (px)
Citation preview
Wireless Network SecurityWireless Network Security
How Does Wireless Differ?How Does Wireless Differ?
Wireless networks are inherently insecure because data is transmitted over a very insecure medium, the air.
Wireless networks are inherently insecure because data is transmitted over a very insecure medium, the air.
Security ConcernsSecurity Concerns
Types of attacks Passive Attacks
Eavesdropping
Active Attacks Registration of a Malicious Node Replay Attack Denial of Service
Common flooding Rogue access point
Man in the Middle Attacks
Types of attacks Passive Attacks
Eavesdropping
Active Attacks Registration of a Malicious Node Replay Attack Denial of Service
Common flooding Rogue access point
Man in the Middle Attacks
GoalsGoals
Availability Require network assets are available when needed and
ensure the survivability of the network services despite DOS attacks
Confidentiality Ensure that certain information is never disclosed to
unauthorized entities Routing information must also remain secure
Integrity Guarantees that the information being transferred is never
altered
Availability Require network assets are available when needed and
ensure the survivability of the network services despite DOS attacks
Confidentiality Ensure that certain information is never disclosed to
unauthorized entities Routing information must also remain secure
Integrity Guarantees that the information being transferred is never
altered
ChallengesChallenges
Attacks can come from all directions and target any node
Damage can include leaking secret information, interfering message delivery and impersonating nodes
Have inadequate physical protection and therefore the network can be more easily compromised
Attacks can come from all directions and target any node
Damage can include leaking secret information, interfering message delivery and impersonating nodes
Have inadequate physical protection and therefore the network can be more easily compromised
SolutionsSolutions
MD5 with 128-bit encryption Keeps information confidential With a shared random number prevents replay attacks
Prevent unauthorized access using MAC filtering Physical security
Secure the building and shield it from outside interference
MD5 with 128-bit encryption Keeps information confidential With a shared random number prevents replay attacks
Prevent unauthorized access using MAC filtering Physical security
Secure the building and shield it from outside interference