Wireless Technology & Wireless Technology & SecuritySecurity
Wireless Local Area NetworksWireless Local Area Networks
What is the IEEE?What is the IEEE?Institute of Electrical and Electronics Engineers Institute of Electrical and Electronics Engineers Not for profitNot for profitSets the standards for 802.11Sets the standards for 802.11
What is 802.11?What is 802.11?Set of standards for WLANSet of standards for WLANProgressing with technologyProgressing with technologyChange is denoted with a letterChange is denoted with a letter
http://www.ieee.org/web/aboutus/home/index.html
Wi-Fi and 802.11Wi-Fi and 802.11
Wi-Fi (wireless fidelity)Wi-Fi (wireless fidelity)WLAN products that utilize 802.11 standardsWLAN products that utilize 802.11 standardsWi-Fi AllianceWi-Fi Alliance
Oversees tests of product certification Oversees tests of product certification Products certified Wi-Fi will work with all 802.11 Products certified Wi-Fi will work with all 802.11
standardsstandards
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci838865,00.html
Wireless & BusinessWireless & Business
By 2007-2008By 2007-200865% of enterprises will have wireless 65% of enterprises will have wireless
applications deployedapplications deployedWith mobile devices outnumbering With mobile devices outnumbering
traditional PCstraditional PCs
-Editors of Computer World
By the dollarsBy the dollars
Total U.S. spending on wireless Total U.S. spending on wireless communications will grow by 9.3% this communications will grow by 9.3% this year, reaching $158.6 billion. It’s year, reaching $158.6 billion. It’s predicted to hit $212.5 billion by 2008, predicted to hit $212.5 billion by 2008, with a 10% compound annual growth with a 10% compound annual growth rate.rate.
-Editors of Computer World
Keys for Growth in BusinessKeys for Growth in Business
Improved SecurityImproved SecuritySteve will address specificsSteve will address specifics
Increased Options involvingIncreased Options involvingSpeedSpeedRangeRangeFrequencyFrequency
-Editors of Computer World
802.11b & a802.11b & a
802.11b & a802.11b & a
““a” implemented in 1999a” implemented in 1999After 802.11b, 2.4GHz and 11 MbpsAfter 802.11b, 2.4GHz and 11 Mbps
Differences from 802.11bDifferences from 802.11bEnhanced data speed to 54 Mbps Enhanced data speed to 54 Mbps Operates in the 5 GHz bandOperates in the 5 GHz band
Less interferenceLess interference
http://www.computerworld.com
http://www.siliconvalley.internet.com
802.11g802.11g
Speed 54 MbpsSpeed 54 MbpsOperates in a 2.4 GHz ISM BandOperates in a 2.4 GHz ISM BandIs it better than a or b?Is it better than a or b?
Yes and NoYes and No
http://siliconvalley.internet.com
802.11g802.11g
Compatibility of 802.11gCompatibility of 802.11g
802.11b802.11b
a,b, and ga,b, and gCombinationCombinationMore expensiveMore expensive
http://www.computerworld.com
Disadvantages of 802.11gDisadvantages of 802.11g
Range can be reduced.Range can be reduced. Radio FrequencyRadio Frequency
Only has 3 fully non-overlapping Only has 3 fully non-overlapping channels.channels. Others can handle up to 11Others can handle up to 11
Before this standard was fully ratified, Before this standard was fully ratified, 802.11n was already being discussed.802.11n was already being discussed.
http://siliconvalley.internet.com
http://www.computerowrld.com
Advantages of 802.11gAdvantages of 802.11g
CompatibilityCompatibility ““Ultimately it takes the guesswork away from the Ultimately it takes the guesswork away from the
user.” –Ben Worthenuser.” –Ben Worthen It’s a “life extension” of 802.11bIt’s a “life extension” of 802.11b
Higher speeds with little price increase.Higher speeds with little price increase.Use it when greater coverage is needed Use it when greater coverage is needed
and cost is a big factor.and cost is a big factor.
http://www.cio.com
802.11n802.11n
DefinitionDefinition
802.11n is a newer standard 802.11n is a newer standard Proper name = IEEE (International Institute of Proper name = IEEE (International Institute of
Electrical and Electronics Engineers) Electrical and Electronics Engineers) The number “11” indicates the IEEE working The number “11” indicates the IEEE working
group within this body, known as TGn.group within this body, known as TGn.
http://www.wisegeek.com/what-is-80211n.htmhttp://www.wisegeek.com/what-is-80211n.htm
IEEE WLAN Standard
Over-the-Air (OTA) Estimates
Media Access Control Layer, Service Access Point (MAC SAP) Estimates
802.11b 11 Mbps 5 Mbps
802.11g 54 Mbps 25 Mbps (when .11b is not present)
802.11a 54 Mbps 25 Mbps
802.11n 200+ Mbps 100 Mbps
Wireless LAN Throughput by IEEE StandardWireless LAN Throughput by IEEE Standard
The hope of implementing 802.11n is so that The hope of implementing 802.11n is so that consumers may be able to use more of a consumers may be able to use more of a
range of products.range of products.
HDTVHDTVStreaming videosStreaming videosOther consumer electonicsOther consumer electonicsPersonal computingPersonal computingHand held platformsHand held platforms
Where can it be used if Where can it be used if implemented?implemented?
All major environments including:All major environments including:EnterprisesEnterprisesHouseholdsHouseholds
Wireless NetworksWireless Networks
Public hotspotsPublic hotspots Coffee Houses (Starbucks, Internet Cafes)Coffee Houses (Starbucks, Internet Cafes) Pizza Parlors (American Dream)Pizza Parlors (American Dream) Schools (OSU entire campus)Schools (OSU entire campus)
What is a hotspot?What is a hotspot?
Hotspot =Hotspot =
Public AreaPublic Area
Wireless network connections to the internetWireless network connections to the internet
NIC = Network Interface CardNIC = Network Interface Card
Have to ask permission to log onto the networkHave to ask permission to log onto the network
Sometimes is free other times costs a small fee (i.e. Sometimes is free other times costs a small fee (i.e. Starbucks)Starbucks)
http://www.wisegeek.com/what-is-a-hotspot.htmhttp://www.wisegeek.com/what-is-a-hotspot.htm
Current Status of 802.11nCurrent Status of 802.11n
Meeting in January 2006 in Kona, HawaiiMeeting in January 2006 in Kona, Hawaii
Wave of the futureWave of the future
Price range of $89.50 - $159.00Price range of $89.50 - $159.00 Only for a pre-N routerOnly for a pre-N router
Benefits of 802.11nBenefits of 802.11n
The connection speed is really fastThe connection speed is really fast
It has a great, wide reaching rangeIt has a great, wide reaching range
Comes with software that is compatible Comes with software that is compatible with both Windows and Macintoshes.with both Windows and Macintoshes.
Disadvantages of 802.11nDisadvantages of 802.11n
It is very expensive as compared with the It is very expensive as compared with the other routers for b/a/gother routers for b/a/g
Requires a MIMO adapter to be able to Requires a MIMO adapter to be able to use it full potential.use it full potential.
http://google-cnet.com/4014-3319_9-30993672.html?part=google-http://google-cnet.com/4014-3319_9-30993672.html?part=google-cnet&subj=103011980&tag=103011980cnet&subj=103011980&tag=103011980
Have the best of the best!!!Have the best of the best!!!
Wireless SecurityWireless Security
References:References:www.wifi-planet.comwww.wifi-planet.comwww.wikipedia.orgwww.wikipedia.orgwww.tomsnetworking.comwww.tomsnetworking.comhttp://engr.oregonstate.edu/computing/http://engr.oregonstate.edu/computing/
Protecting Access and SignalProtecting Access and Signal
Wireless Security needs to protect two separate Wireless Security needs to protect two separate parts of the wireless network.parts of the wireless network.
Access – Control who can access the networkAccess – Control who can access the network
Signal – Control who can read the signal.Signal – Control who can read the signal.
Controlling AccessControlling Access End to End EncryptionEnd to End Encryption
MAC FilteringMAC Filtering Controlling which devices can “Log on” to the networkControlling which devices can “Log on” to the network This method can be hacked using a MAC Spoof This method can be hacked using a MAC Spoof
(kind of like identity theft for wireless computers)(kind of like identity theft for wireless computers)
SSID BroadcastingSSID Broadcasting Do not broadcast the SSID (Service Set Identifier)Do not broadcast the SSID (Service Set Identifier) If the hackers cannot see your network, it is harder to get intoIf the hackers cannot see your network, it is harder to get into
One example of end to end encryption is online banking. Ever One example of end to end encryption is online banking. Ever notice the https?notice the https?
https://www.bankofamerica.comhttps://www.bankofamerica.com
Controlling the signalControlling the signal WEP – Wireless Equivalent PrivacyWEP – Wireless Equivalent Privacy
64 or 128 bit encryption. 64 or 128 bit encryption. Very easy to break. Very easy to break. FBI demonstrated a 3 minute breach using common hacking softwareFBI demonstrated a 3 minute breach using common hacking software11
WPA – Wifi Protected AccessWPA – Wifi Protected Access This adds additional security features to WEP. This adds additional security features to WEP. Much harder to crack and can use a pre-shared key (PSK)Much harder to crack and can use a pre-shared key (PSK)
Like a secret passwordLike a secret password Based on the 801.11i standardBased on the 801.11i standard
WPA2 – WPA with AESWPA2 – WPA with AES (Advanced Encryption Standard)(Advanced Encryption Standard) Algorithm from WPA is replaced by a message authentication code, Algorithm from WPA is replaced by a message authentication code,
CCMPCCMP
Other ways to get securedOther ways to get secured
VPN – Virtual Private NetworkVPN – Virtual Private Network Two types – Secure and UnsecuredTwo types – Secure and Unsecured
Secured VPNSecured VPN uses uses cryptographiccryptographic tunneling protocols to provide the tunneling protocols to provide the
necessary confidentiality (preventing snooping), necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), sender authentication (preventing identity spoofing), and message integrity (preventing message and message integrity (preventing message alteration) to achieve the privacy intended. When alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such properly chosen, implemented, and used, such techniques can provide secure communications over techniques can provide secure communications over unsecured networksunsecured networks
Connecting to OSU_PUB Connecting to OSU_PUB DomainDomain
Enable Wireless LAN on your deviceEnable Wireless LAN on your device Go to the internetGo to the internet Browser will redirect you to the wireless security page Browser will redirect you to the wireless security page
for OSU (See next page)for OSU (See next page) Enter login information (See next page)Enter login information (See next page) Enter computer information (See next page)Enter computer information (See next page) Quit browser (15-20 min)Quit browser (15-20 min) SurfSurf Your computer is now permanently registered with Your computer is now permanently registered with
OSU (College of Engineering)OSU (College of Engineering)
Questions?Questions?