1 / 19

Wireless Security

Wireless Security. Traditional method. A computer with network card a cable connecting network card and the network. Wireless technology at home. Infrared (IR) or Radio transmission e.g. remote control, cordless computer keyboards and mouse, stereo headsets Short distance, simple signals.

Télécharger la présentation

Wireless Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Security

  2. Traditional method • A computer with network card • a cable connecting network card and the network

  3. Wireless technology at home • Infrared (IR) or Radio transmission • e.g. remote control, cordless computer keyboards and mouse, stereo headsets • Short distance, simple signals

  4. Wireless connection • Access point with cable connection to the network • IEEE802.11 wireless card

  5. Figure 1: Mobile Devices

  6. IEEE802.11x standards • Developed by IEEE (Institute of Electronic and Electrical Engineers) • Have many standards (e.g. IEEE802.11a, IEEE802.11b,IEEE802.11g, etc) • Began in 1990 • Took 7 years to complete the first standard

  7. Products available in the Market • Only products of three standards • IEEE802.11b • First product in the market • IEEE802.11a and IEEE802.11g arrive almost simultaneously

  8. comparison

  9. Bluetooth • Low-cost, low-power • Cover 10 meters • Max speed: 700 Kbps. • Use 2.4 GHz radio frequency • Not a competitor of IEEE 802.11 • Replace cables in short distance

  10. User Knowledge • Lack of security features in mobile devices • Immature wireless technology • Security features not turned on • Users unaware of security problems

  11. Figure 2 Eavesdropping by attacker Eavesdropping

  12. Program downloading • Small memory • More often to download program

  13. Eavesdropping • Difficult to discover • Can use ordinary mobile device to attack (e.g. notebook computer) • Software available in public domain • Can attack from 20 miles away

  14. Potential thread of download programs • Reading or writing files (such as passwords) on the devices • Delete files • Connecting to other computers or devices • perform illegal operations (such as hacking)

  15. Jamming

  16. Steps in jamming • Listen to communication first • Collect information • Break the communication • Impersonate the jammed user to continue communication Or impersonate the server

  17. Jamming

  18. Man-in-the-middle • Listen to communication • Intercepts the message • Modify or add data in the message • Confidential and integrity problem

  19. Identity of attacker • Mobile device is small (e.g. PDA) • Difficult to detect • Difficult to locate the attacker

More Related