slide 1 - classes.bus.oregonstate.edu -

Post on 20-Jun-2015

237 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Wireless Technology & Wireless Technology & SecuritySecurity

Wireless Local Area NetworksWireless Local Area Networks

What is the IEEE?What is the IEEE?Institute of Electrical and Electronics Engineers Institute of Electrical and Electronics Engineers Not for profitNot for profitSets the standards for 802.11Sets the standards for 802.11

What is 802.11?What is 802.11?Set of standards for WLANSet of standards for WLANProgressing with technologyProgressing with technologyChange is denoted with a letterChange is denoted with a letter

http://www.ieee.org/web/aboutus/home/index.html

Wi-Fi and 802.11Wi-Fi and 802.11

Wi-Fi (wireless fidelity)Wi-Fi (wireless fidelity)WLAN products that utilize 802.11 standardsWLAN products that utilize 802.11 standardsWi-Fi AllianceWi-Fi Alliance

Oversees tests of product certification Oversees tests of product certification Products certified Wi-Fi will work with all 802.11 Products certified Wi-Fi will work with all 802.11

standardsstandards

http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci838865,00.html

Wireless & BusinessWireless & Business

By 2007-2008By 2007-200865% of enterprises will have wireless 65% of enterprises will have wireless

applications deployedapplications deployedWith mobile devices outnumbering With mobile devices outnumbering

traditional PCstraditional PCs

-Editors of Computer World

By the dollarsBy the dollars

Total U.S. spending on wireless Total U.S. spending on wireless communications will grow by 9.3% this communications will grow by 9.3% this year, reaching $158.6 billion. It’s year, reaching $158.6 billion. It’s predicted to hit $212.5 billion by 2008, predicted to hit $212.5 billion by 2008, with a 10% compound annual growth with a 10% compound annual growth rate.rate.

-Editors of Computer World

Keys for Growth in BusinessKeys for Growth in Business

Improved SecurityImproved SecuritySteve will address specificsSteve will address specifics

Increased Options involvingIncreased Options involvingSpeedSpeedRangeRangeFrequencyFrequency

-Editors of Computer World

802.11b & a802.11b & a

802.11b & a802.11b & a

““a” implemented in 1999a” implemented in 1999After 802.11b, 2.4GHz and 11 MbpsAfter 802.11b, 2.4GHz and 11 Mbps

Differences from 802.11bDifferences from 802.11bEnhanced data speed to 54 Mbps Enhanced data speed to 54 Mbps Operates in the 5 GHz bandOperates in the 5 GHz band

Less interferenceLess interference

http://www.computerworld.com

http://www.siliconvalley.internet.com

802.11g802.11g

Speed 54 MbpsSpeed 54 MbpsOperates in a 2.4 GHz ISM BandOperates in a 2.4 GHz ISM BandIs it better than a or b?Is it better than a or b?

Yes and NoYes and No

http://siliconvalley.internet.com

802.11g802.11g

Compatibility of 802.11gCompatibility of 802.11g

802.11b802.11b

a,b, and ga,b, and gCombinationCombinationMore expensiveMore expensive

http://www.computerworld.com

Disadvantages of 802.11gDisadvantages of 802.11g

Range can be reduced.Range can be reduced. Radio FrequencyRadio Frequency

Only has 3 fully non-overlapping Only has 3 fully non-overlapping channels.channels. Others can handle up to 11Others can handle up to 11

Before this standard was fully ratified, Before this standard was fully ratified, 802.11n was already being discussed.802.11n was already being discussed.

http://siliconvalley.internet.com

http://www.computerowrld.com

Advantages of 802.11gAdvantages of 802.11g

CompatibilityCompatibility ““Ultimately it takes the guesswork away from the Ultimately it takes the guesswork away from the

user.” –Ben Worthenuser.” –Ben Worthen It’s a “life extension” of 802.11bIt’s a “life extension” of 802.11b

Higher speeds with little price increase.Higher speeds with little price increase.Use it when greater coverage is needed Use it when greater coverage is needed

and cost is a big factor.and cost is a big factor.

http://www.cio.com

802.11n802.11n

DefinitionDefinition

802.11n is a newer standard 802.11n is a newer standard Proper name = IEEE (International Institute of Proper name = IEEE (International Institute of

Electrical and Electronics Engineers) Electrical and Electronics Engineers) The number “11” indicates the IEEE working The number “11” indicates the IEEE working

group within this body, known as TGn.group within this body, known as TGn.

http://www.wisegeek.com/what-is-80211n.htmhttp://www.wisegeek.com/what-is-80211n.htm

IEEE WLAN Standard

Over-the-Air (OTA) Estimates

Media Access Control Layer, Service Access Point (MAC SAP) Estimates

802.11b 11 Mbps 5 Mbps

802.11g 54 Mbps 25 Mbps (when .11b is not present)

802.11a 54 Mbps 25 Mbps

802.11n 200+ Mbps 100 Mbps

Wireless LAN Throughput by IEEE StandardWireless LAN Throughput by IEEE Standard

The hope of implementing 802.11n is so that The hope of implementing 802.11n is so that consumers may be able to use more of a consumers may be able to use more of a

range of products.range of products.

HDTVHDTVStreaming videosStreaming videosOther consumer electonicsOther consumer electonicsPersonal computingPersonal computingHand held platformsHand held platforms

Where can it be used if Where can it be used if implemented?implemented?

All major environments including:All major environments including:EnterprisesEnterprisesHouseholdsHouseholds

Wireless NetworksWireless Networks

Public hotspotsPublic hotspots Coffee Houses (Starbucks, Internet Cafes)Coffee Houses (Starbucks, Internet Cafes) Pizza Parlors (American Dream)Pizza Parlors (American Dream) Schools (OSU entire campus)Schools (OSU entire campus)

What is a hotspot?What is a hotspot?

Hotspot =Hotspot =

Public AreaPublic Area

Wireless network connections to the internetWireless network connections to the internet

NIC = Network Interface CardNIC = Network Interface Card

Have to ask permission to log onto the networkHave to ask permission to log onto the network

Sometimes is free other times costs a small fee (i.e. Sometimes is free other times costs a small fee (i.e. Starbucks)Starbucks)

http://www.wisegeek.com/what-is-a-hotspot.htmhttp://www.wisegeek.com/what-is-a-hotspot.htm

Current Status of 802.11nCurrent Status of 802.11n

Meeting in January 2006 in Kona, HawaiiMeeting in January 2006 in Kona, Hawaii

Wave of the futureWave of the future

Price range of $89.50 - $159.00Price range of $89.50 - $159.00 Only for a pre-N routerOnly for a pre-N router

Benefits of 802.11nBenefits of 802.11n

The connection speed is really fastThe connection speed is really fast

It has a great, wide reaching rangeIt has a great, wide reaching range

Comes with software that is compatible Comes with software that is compatible with both Windows and Macintoshes.with both Windows and Macintoshes.

Disadvantages of 802.11nDisadvantages of 802.11n

It is very expensive as compared with the It is very expensive as compared with the other routers for b/a/gother routers for b/a/g

Requires a MIMO adapter to be able to Requires a MIMO adapter to be able to use it full potential.use it full potential.

http://google-cnet.com/4014-3319_9-30993672.html?part=google-http://google-cnet.com/4014-3319_9-30993672.html?part=google-cnet&subj=103011980&tag=103011980cnet&subj=103011980&tag=103011980

Have the best of the best!!!Have the best of the best!!!

Wireless SecurityWireless Security

References:References:www.wifi-planet.comwww.wifi-planet.comwww.wikipedia.orgwww.wikipedia.orgwww.tomsnetworking.comwww.tomsnetworking.comhttp://engr.oregonstate.edu/computing/http://engr.oregonstate.edu/computing/

Protecting Access and SignalProtecting Access and Signal

Wireless Security needs to protect two separate Wireless Security needs to protect two separate parts of the wireless network.parts of the wireless network.

Access – Control who can access the networkAccess – Control who can access the network

Signal – Control who can read the signal.Signal – Control who can read the signal.

Controlling AccessControlling Access End to End EncryptionEnd to End Encryption

MAC FilteringMAC Filtering Controlling which devices can “Log on” to the networkControlling which devices can “Log on” to the network This method can be hacked using a MAC Spoof This method can be hacked using a MAC Spoof

(kind of like identity theft for wireless computers)(kind of like identity theft for wireless computers)

SSID BroadcastingSSID Broadcasting Do not broadcast the SSID (Service Set Identifier)Do not broadcast the SSID (Service Set Identifier) If the hackers cannot see your network, it is harder to get intoIf the hackers cannot see your network, it is harder to get into

One example of end to end encryption is online banking. Ever One example of end to end encryption is online banking. Ever notice the https?notice the https?

https://www.bankofamerica.comhttps://www.bankofamerica.com

Controlling the signalControlling the signal WEP – Wireless Equivalent PrivacyWEP – Wireless Equivalent Privacy

64 or 128 bit encryption. 64 or 128 bit encryption. Very easy to break. Very easy to break. FBI demonstrated a 3 minute breach using common hacking softwareFBI demonstrated a 3 minute breach using common hacking software11

WPA – Wifi Protected AccessWPA – Wifi Protected Access This adds additional security features to WEP. This adds additional security features to WEP. Much harder to crack and can use a pre-shared key (PSK)Much harder to crack and can use a pre-shared key (PSK)

Like a secret passwordLike a secret password Based on the 801.11i standardBased on the 801.11i standard

WPA2 – WPA with AESWPA2 – WPA with AES (Advanced Encryption Standard)(Advanced Encryption Standard) Algorithm from WPA is replaced by a message authentication code, Algorithm from WPA is replaced by a message authentication code,

CCMPCCMP

Other ways to get securedOther ways to get secured

VPN – Virtual Private NetworkVPN – Virtual Private Network Two types – Secure and UnsecuredTwo types – Secure and Unsecured

Secured VPNSecured VPN uses uses cryptographiccryptographic tunneling protocols to provide the tunneling protocols to provide the

necessary confidentiality (preventing snooping), necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), sender authentication (preventing identity spoofing), and message integrity (preventing message and message integrity (preventing message alteration) to achieve the privacy intended. When alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such properly chosen, implemented, and used, such techniques can provide secure communications over techniques can provide secure communications over unsecured networksunsecured networks

Connecting to OSU_PUB Connecting to OSU_PUB DomainDomain

Enable Wireless LAN on your deviceEnable Wireless LAN on your device Go to the internetGo to the internet Browser will redirect you to the wireless security page Browser will redirect you to the wireless security page

for OSU (See next page)for OSU (See next page) Enter login information (See next page)Enter login information (See next page) Enter computer information (See next page)Enter computer information (See next page) Quit browser (15-20 min)Quit browser (15-20 min) SurfSurf Your computer is now permanently registered with Your computer is now permanently registered with

OSU (College of Engineering)OSU (College of Engineering)

Questions?Questions?

top related