1 / 8

Enhancing 802.11 Security for WLANs: Current and Future Solutions

This presentation by Darrin Miller from Cisco explores the evolving landscape of security for 802.11 Wireless LANs (WLANs). It addresses current challenges and future developments in public and private WLANs, emphasizing the importance of robust authentication, confidentiality, and interoperability among devices. Key topics include the implementation of WiFi Protected Access (WPA), tunneling overlays, the upcoming Task Group i (TGi) advancements, and the critical role of legacy device support. The discussion also covers the need for user-based service authentication and compliance with corporate security policies in a dual-network environment.

orli-lowery
Download Presentation

Enhancing 802.11 Security for WLANs: Current and Future Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 802.11 Security (Again, Sorry) Darrin Miller dmiller@cisco.com

  2. Agenda Today Tomorrow Public WLANs Private WLANs Future

  3. Today Proprietary Implementations  Variety of implementations that thwart the large threats to 802.11 Wireless LANs (WLANs) WiFi Protected Access (WPA) Imminent, and again mitigates the large threats to 802.11 WLANs Tunneling overlays (SSL, SSH, IPsec)

  4. Tomorrow - 802.11 – Task Group i (TGi) • Pros • Stronger Encryption (AES) • More complete features and mitigation of threats • authenticated management frames • Secure ad-hoc networking • Secure roaming • Challenges • Must evaluate the entire system for security • Relies on other entities for security (IETF) • How soon will TGi be finished and how soon will vendors produce interoperable products • EAP acronym soup (EAP-TLS, PEAP, EAP-TTLS)

  5. Public WLANs • Today • Authentication Mandatory • Typically No Confidentiality • Limited Roaming • Dedicated Access Points • Tomorrow • Legacy Device Support • Roaming Mandatory • Fraud Protection • Confidentiality Desired • Shared Use Access Points

  6. Private WLANs • Today • Authentication Mandatory • Confidentiality Mandatory • Legacy Device Support • Tomorrow • QOS Support Mandatory (VoIP) • Secure Roaming Mandatory • Legacy Device Support • Easier Deployment • Easier Management

  7. Future - Devices in Motion • Handoff of service between WLAN and Wireless WAN • Authentication assurance • Confidentiality assurance • Consistency across standards bodies (?) • Public Services Based Network • Corporate Application Access • User Based Public Service • Personal Use • User Based Private to Public Service • How do we consistently authenticate the user to the both services • Corporate Security Policy compliance. Is it OK to be connected to two networks at once. Will the end user or corporation even know?

  8. Feedback?

More Related