1 / 17

Securing Wireless LANs and Wireless MANs

ITEC810. Securing WLANs and WMANs. Securing Wireless LANs and Wireless MANs. By Peter Nicola Supervisor: Dr. Michael Hitchens. Securing WLANs and WMANs. Agenda. What is it about? WLAN WMAN Conclusion. Securing WLANs and WMANs. What is it about?.

nhi
Download Presentation

Securing Wireless LANs and Wireless MANs

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ITEC810 Securing WLANs and WMANs Securing Wireless LANs and Wireless MANs By Peter Nicola Supervisor: Dr. Michael Hitchens

  2. Securing WLANs and WMANs Agenda • What is it about? • WLAN • WMAN • Conclusion

  3. Securing WLANs and WMANs What is it about? • The world is moving from Wired to Wireless Networking. • Two forms of Wireless Networking are discussed • The need to secure them WMAN WLAN

  4. Securing WLANs and WMANs Agenda • What is it about? • WLANs • WMANs • Conclusion

  5. Securing WLANs and WMANs WLAN • What is it? • Security Approaches WEP Algorithms WPA WPA2 Other approaches MAC Filtering SSID Broadcast

  6. Securing WLANs and WMANs WLAN Threats Evil Twin War Driving SSID: Macquarie University Replicated SSID: Macquarie University

  7. Securing WLANs and WMANs WLAN War Driving Well Secured Google Maps www.wifimaps.com Weakly or not Secured

  8. Securing WLANs and WMANs War Driving WLAN Search Result in Australia Search Result Worldwide

  9. Securing WLANs and WMANs WLAN Outcome Algorithm Used Key Complexity Keep them secured SSID Choice - Hiding MAC Filtering Management Software Possible Improvements Digital IDs Embedded Hardware Encryption

  10. Securing WLANs and WMANs Agenda • What is it about? • WLANs • WMANs • Conclusion

  11. Securing WLANs and WMANs WMAN • What is it? • Security Approaches PKM (Privacy Key Management) AK and TEK 3DES & X.509 Other approaches DOCSIS usage Lessons learned from WLAN

  12. Securing WLANs and WMANs WMAN Threats and Vulnerabilities No PHY layer protection One Way Authentication Jamming and DoS

  13. Securing WLANs and WMANs WMAN One Way Authentication So, what is the problem? Certificate Key Request Cryptographic capabilities, … TEK (valid for 12 hours  7 days) AK (valid for 1  70 days) User Traffic BS SS

  14. Securing WLANs and WMANs WMAN Outcome Physical Layer Protection Mutual Authentication What can be Improved? Shorter Key Life How do BSs authenticate each other?

  15. Securing WLANs and WMANs Agenda • What is it about? • WLANs • WMANs • Conclusion

  16. Securing WLANs and WMANs Conclusion • Wide usage of Wireless Networks • Perfect security does not exist • Operators are encouraged to know what threats are there, and how to be secured against them • There is always a room for improvements

  17. Securing WLANs and WMANs Thanks Thanks for your attention Any Questions?

More Related