1 / 12

Wireless Networks

Wireless Networks. Wireless Network. A wireless network transports data from one device to another without cables or wires RF signals Microwaves Infrared light Slower than wired networks

delora
Download Presentation

Wireless Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Networks

  2. Wireless Network • A wireless network transports data from one device to another without cables or wires • RF signals • Microwaves • Infrared light • Slower than wired networks • Security concerns - Wireless networks are much more susceptible to unauthorized access and use than wired networks

  3. Wireless Network • Information transmitted over wireless networks • Wireless LANs • Bluetooth and other personal area networks • Cellular networks • Satellite systems • Fixed Wireless • Main issue: information transmitted over common medium (air) • Security approaches at several levels (Networks to applications)

  4. Network Classifications • Personal Area Network (PAN) – interconnection of personal digital devices (Bluetooth) • Neighborhood Area Network (NAN) – connectivity spread over several buildings • Local Area Network (LAN) – usually connects computers in a single building – this is the one most people have heard of • Metropolitan Area Network (MAN) – public high-speed network with range of about 50 miles • Wide Area Network (WAN) – consists of several smaller networks

  5. Wireless Networks at a Glance Wireless Networks Wireless MANs Wireless LANs Wireless WANs Cellular Networks Cellular Networks Satellite Systems Paging Networks Wireless Local Loops Personal Area Networks Business LANs Bluetooth 1 Mbps, 10 meters Example1: GSM, 9.6 Kbps, wide coverage Example2: 3G, 2 Mbps, wide coverage Example1: FLEX, 1.2 Kbps Example2: ReFLEX, 6.4Kbps Example: LMDS 10 Mbps, 100 Km Wireless Ethernet 11 Mbps, 100 Meters Example: Motorola Iridium up to 64 Mbps globally

  6. Levels of Wireless Security • PGP for secure email • Java security • Database security Applications • SSL • WAP security • Proxy server security Middleware TCP/IP • VPN • 802.11 security (WEP, WPA) • Cellular network security • Satellite link security • WLL and cordless link security Wireless Link

  7. WEP and WPA • Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP) have a pre-shared key as the basis for encryption, • WEP’s use of the pre-shared key is relatively static, whereby it uses rudimentary variations of the same key to encrypt all packets (transmitted data). • This is not very safe, as a large sample of encrypted packets using the same key tends to create an easy key recovery target for hackers. • WPA uses apre-shared key to derive a temporal key that is used to encrypt all packets. • As WPA generates a unique key for each association, the pre-shared key is rarely used - making it difficult for hackers to lock onto a common key to crack the network.

  8. A Cellular Network Cell 1 Public Switched Telephone Network (PSTN) Mobile Telephone Switching Center (MTSC) Cell 2 Base Transceiver Station (BTS) Mobile User Cordless connection Wired connection

  9. Security concerns unique to the cellular networks • The call setup information that includes the user ID and other information should be protected • The speech and data transmitted during a cellular conversation should be kept private and confidential. • Privacy of user location. The location (cell ID) from where the user is calling should be private and also the VLR/HLR records that trace where the user has been visiting should be kept private. • The calling patterns (e.g., calling home everyday at 5 PM to inform your family about when you will be home) should be private. • The user-ID in the cellular networks should be kept private.

  10. Satellite System Security Encryption/ Spread Spectrum Physical security of earth station • Typically secured through scrambling of satellite by spread • spectrum techniques. • For additional security, the messages can be encrypted by using VPNs • Employing better physical security on ground stations.

  11. Satellite Security • US General Accounting Office (GAO) report found critical vulnerabilities in the nation's commercial satellite network. • Federal agencies using commercial satellites may be exposing sensitive data to unauthorized snooping. • The government uses encryption to protect satellite communications and employs physical security to protect ground stations • But many federal agencies rely on commercial satellite service providers • Commercial providers may not provide adequate security

  12. Some Guidelines for wireless Network security • Turn on security at wireless links to avoid eavesdropping even if it is deficient. • For example, use WEP because it does provide some security -- make up for WEP security by providing higher layers of security (e.g., SSL). • Make sure that all access points are themselves monitored and controlled so that no one sets up rogue access points. • Treat wireless networks as untrusted networks. Thus put the internal WLANs outside the firewall so that they are treated as outsiders. • Minimize placing critical applications and databases on wireless networks;move them to wired networks behind firewalls. • Make sure that the passwords on wireless networks are different than the wired networks. Hackers usually capture passwords from wireless networks and then use them to gain access over wired networks.

More Related