+ All Categories
Home > Documents > Slide 1 - classes.bus.oregonstate.edu -

Slide 1 - classes.bus.oregonstate.edu -

Date post: 20-Jun-2015
Category:
Upload: johnsondon
View: 235 times
Download: 0 times
Share this document with a friend
Popular Tags:
32
Wireless Wireless Technology & Technology & Security Security
Transcript
Page 1: Slide 1 - classes.bus.oregonstate.edu -

Wireless Technology & Wireless Technology & SecuritySecurity

Page 2: Slide 1 - classes.bus.oregonstate.edu -

Wireless Local Area NetworksWireless Local Area Networks

What is the IEEE?What is the IEEE?Institute of Electrical and Electronics Engineers Institute of Electrical and Electronics Engineers Not for profitNot for profitSets the standards for 802.11Sets the standards for 802.11

What is 802.11?What is 802.11?Set of standards for WLANSet of standards for WLANProgressing with technologyProgressing with technologyChange is denoted with a letterChange is denoted with a letter

http://www.ieee.org/web/aboutus/home/index.html

Page 3: Slide 1 - classes.bus.oregonstate.edu -

Wi-Fi and 802.11Wi-Fi and 802.11

Wi-Fi (wireless fidelity)Wi-Fi (wireless fidelity)WLAN products that utilize 802.11 standardsWLAN products that utilize 802.11 standardsWi-Fi AllianceWi-Fi Alliance

Oversees tests of product certification Oversees tests of product certification Products certified Wi-Fi will work with all 802.11 Products certified Wi-Fi will work with all 802.11

standardsstandards

http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci838865,00.html

Page 4: Slide 1 - classes.bus.oregonstate.edu -

Wireless & BusinessWireless & Business

By 2007-2008By 2007-200865% of enterprises will have wireless 65% of enterprises will have wireless

applications deployedapplications deployedWith mobile devices outnumbering With mobile devices outnumbering

traditional PCstraditional PCs

-Editors of Computer World

Page 5: Slide 1 - classes.bus.oregonstate.edu -

By the dollarsBy the dollars

Total U.S. spending on wireless Total U.S. spending on wireless communications will grow by 9.3% this communications will grow by 9.3% this year, reaching $158.6 billion. It’s year, reaching $158.6 billion. It’s predicted to hit $212.5 billion by 2008, predicted to hit $212.5 billion by 2008, with a 10% compound annual growth with a 10% compound annual growth rate.rate.

-Editors of Computer World

Page 6: Slide 1 - classes.bus.oregonstate.edu -

Keys for Growth in BusinessKeys for Growth in Business

Improved SecurityImproved SecuritySteve will address specificsSteve will address specifics

Increased Options involvingIncreased Options involvingSpeedSpeedRangeRangeFrequencyFrequency

-Editors of Computer World

Page 7: Slide 1 - classes.bus.oregonstate.edu -

802.11b & a802.11b & a

Page 8: Slide 1 - classes.bus.oregonstate.edu -

802.11b & a802.11b & a

““a” implemented in 1999a” implemented in 1999After 802.11b, 2.4GHz and 11 MbpsAfter 802.11b, 2.4GHz and 11 Mbps

Differences from 802.11bDifferences from 802.11bEnhanced data speed to 54 Mbps Enhanced data speed to 54 Mbps Operates in the 5 GHz bandOperates in the 5 GHz band

Less interferenceLess interference

http://www.computerworld.com

http://www.siliconvalley.internet.com

Page 9: Slide 1 - classes.bus.oregonstate.edu -

802.11g802.11g

Page 10: Slide 1 - classes.bus.oregonstate.edu -

Speed 54 MbpsSpeed 54 MbpsOperates in a 2.4 GHz ISM BandOperates in a 2.4 GHz ISM BandIs it better than a or b?Is it better than a or b?

Yes and NoYes and No

http://siliconvalley.internet.com

802.11g802.11g

Page 11: Slide 1 - classes.bus.oregonstate.edu -

Compatibility of 802.11gCompatibility of 802.11g

802.11b802.11b

a,b, and ga,b, and gCombinationCombinationMore expensiveMore expensive

http://www.computerworld.com

Page 12: Slide 1 - classes.bus.oregonstate.edu -

Disadvantages of 802.11gDisadvantages of 802.11g

Range can be reduced.Range can be reduced. Radio FrequencyRadio Frequency

Only has 3 fully non-overlapping Only has 3 fully non-overlapping channels.channels. Others can handle up to 11Others can handle up to 11

Before this standard was fully ratified, Before this standard was fully ratified, 802.11n was already being discussed.802.11n was already being discussed.

http://siliconvalley.internet.com

http://www.computerowrld.com

Page 13: Slide 1 - classes.bus.oregonstate.edu -

Advantages of 802.11gAdvantages of 802.11g

CompatibilityCompatibility ““Ultimately it takes the guesswork away from the Ultimately it takes the guesswork away from the

user.” –Ben Worthenuser.” –Ben Worthen It’s a “life extension” of 802.11bIt’s a “life extension” of 802.11b

Higher speeds with little price increase.Higher speeds with little price increase.Use it when greater coverage is needed Use it when greater coverage is needed

and cost is a big factor.and cost is a big factor.

http://www.cio.com

Page 14: Slide 1 - classes.bus.oregonstate.edu -

802.11n802.11n

Page 15: Slide 1 - classes.bus.oregonstate.edu -

DefinitionDefinition

802.11n is a newer standard 802.11n is a newer standard Proper name = IEEE (International Institute of Proper name = IEEE (International Institute of

Electrical and Electronics Engineers) Electrical and Electronics Engineers) The number “11” indicates the IEEE working The number “11” indicates the IEEE working

group within this body, known as TGn.group within this body, known as TGn.

http://www.wisegeek.com/what-is-80211n.htmhttp://www.wisegeek.com/what-is-80211n.htm

Page 16: Slide 1 - classes.bus.oregonstate.edu -

IEEE WLAN Standard

Over-the-Air (OTA) Estimates

Media Access Control Layer, Service Access Point (MAC SAP) Estimates

802.11b 11 Mbps 5 Mbps

802.11g 54 Mbps 25 Mbps (when .11b is not present)

802.11a 54 Mbps 25 Mbps

802.11n 200+ Mbps 100 Mbps

Wireless LAN Throughput by IEEE StandardWireless LAN Throughput by IEEE Standard

Page 17: Slide 1 - classes.bus.oregonstate.edu -

The hope of implementing 802.11n is so that The hope of implementing 802.11n is so that consumers may be able to use more of a consumers may be able to use more of a

range of products.range of products.

HDTVHDTVStreaming videosStreaming videosOther consumer electonicsOther consumer electonicsPersonal computingPersonal computingHand held platformsHand held platforms

Page 18: Slide 1 - classes.bus.oregonstate.edu -

Where can it be used if Where can it be used if implemented?implemented?

All major environments including:All major environments including:EnterprisesEnterprisesHouseholdsHouseholds

Wireless NetworksWireless Networks

Public hotspotsPublic hotspots Coffee Houses (Starbucks, Internet Cafes)Coffee Houses (Starbucks, Internet Cafes) Pizza Parlors (American Dream)Pizza Parlors (American Dream) Schools (OSU entire campus)Schools (OSU entire campus)

Page 19: Slide 1 - classes.bus.oregonstate.edu -

What is a hotspot?What is a hotspot?

Hotspot =Hotspot =

Public AreaPublic Area

Wireless network connections to the internetWireless network connections to the internet

NIC = Network Interface CardNIC = Network Interface Card

Have to ask permission to log onto the networkHave to ask permission to log onto the network

Sometimes is free other times costs a small fee (i.e. Sometimes is free other times costs a small fee (i.e. Starbucks)Starbucks)

http://www.wisegeek.com/what-is-a-hotspot.htmhttp://www.wisegeek.com/what-is-a-hotspot.htm

Page 20: Slide 1 - classes.bus.oregonstate.edu -

Current Status of 802.11nCurrent Status of 802.11n

Meeting in January 2006 in Kona, HawaiiMeeting in January 2006 in Kona, Hawaii

Wave of the futureWave of the future

Price range of $89.50 - $159.00Price range of $89.50 - $159.00 Only for a pre-N routerOnly for a pre-N router

Page 21: Slide 1 - classes.bus.oregonstate.edu -

Benefits of 802.11nBenefits of 802.11n

The connection speed is really fastThe connection speed is really fast

It has a great, wide reaching rangeIt has a great, wide reaching range

Comes with software that is compatible Comes with software that is compatible with both Windows and Macintoshes.with both Windows and Macintoshes.

Page 22: Slide 1 - classes.bus.oregonstate.edu -

Disadvantages of 802.11nDisadvantages of 802.11n

It is very expensive as compared with the It is very expensive as compared with the other routers for b/a/gother routers for b/a/g

Requires a MIMO adapter to be able to Requires a MIMO adapter to be able to use it full potential.use it full potential.

http://google-cnet.com/4014-3319_9-30993672.html?part=google-http://google-cnet.com/4014-3319_9-30993672.html?part=google-cnet&subj=103011980&tag=103011980cnet&subj=103011980&tag=103011980

Page 23: Slide 1 - classes.bus.oregonstate.edu -

Have the best of the best!!!Have the best of the best!!!

Page 24: Slide 1 - classes.bus.oregonstate.edu -

Wireless SecurityWireless Security

References:References:www.wifi-planet.comwww.wifi-planet.comwww.wikipedia.orgwww.wikipedia.orgwww.tomsnetworking.comwww.tomsnetworking.comhttp://engr.oregonstate.edu/computing/http://engr.oregonstate.edu/computing/

Page 25: Slide 1 - classes.bus.oregonstate.edu -

Protecting Access and SignalProtecting Access and Signal

Wireless Security needs to protect two separate Wireless Security needs to protect two separate parts of the wireless network.parts of the wireless network.

Access – Control who can access the networkAccess – Control who can access the network

Signal – Control who can read the signal.Signal – Control who can read the signal.

Page 26: Slide 1 - classes.bus.oregonstate.edu -

Controlling AccessControlling Access End to End EncryptionEnd to End Encryption

MAC FilteringMAC Filtering Controlling which devices can “Log on” to the networkControlling which devices can “Log on” to the network This method can be hacked using a MAC Spoof This method can be hacked using a MAC Spoof

(kind of like identity theft for wireless computers)(kind of like identity theft for wireless computers)

SSID BroadcastingSSID Broadcasting Do not broadcast the SSID (Service Set Identifier)Do not broadcast the SSID (Service Set Identifier) If the hackers cannot see your network, it is harder to get intoIf the hackers cannot see your network, it is harder to get into

One example of end to end encryption is online banking. Ever One example of end to end encryption is online banking. Ever notice the https?notice the https?

https://www.bankofamerica.comhttps://www.bankofamerica.com

Page 27: Slide 1 - classes.bus.oregonstate.edu -

Controlling the signalControlling the signal WEP – Wireless Equivalent PrivacyWEP – Wireless Equivalent Privacy

64 or 128 bit encryption. 64 or 128 bit encryption. Very easy to break. Very easy to break. FBI demonstrated a 3 minute breach using common hacking softwareFBI demonstrated a 3 minute breach using common hacking software11

WPA – Wifi Protected AccessWPA – Wifi Protected Access This adds additional security features to WEP. This adds additional security features to WEP. Much harder to crack and can use a pre-shared key (PSK)Much harder to crack and can use a pre-shared key (PSK)

Like a secret passwordLike a secret password Based on the 801.11i standardBased on the 801.11i standard

WPA2 – WPA with AESWPA2 – WPA with AES (Advanced Encryption Standard)(Advanced Encryption Standard) Algorithm from WPA is replaced by a message authentication code, Algorithm from WPA is replaced by a message authentication code,

CCMPCCMP

Page 28: Slide 1 - classes.bus.oregonstate.edu -

Other ways to get securedOther ways to get secured

VPN – Virtual Private NetworkVPN – Virtual Private Network Two types – Secure and UnsecuredTwo types – Secure and Unsecured

Secured VPNSecured VPN uses uses cryptographiccryptographic tunneling protocols to provide the tunneling protocols to provide the

necessary confidentiality (preventing snooping), necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), sender authentication (preventing identity spoofing), and message integrity (preventing message and message integrity (preventing message alteration) to achieve the privacy intended. When alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such properly chosen, implemented, and used, such techniques can provide secure communications over techniques can provide secure communications over unsecured networksunsecured networks

Page 29: Slide 1 - classes.bus.oregonstate.edu -

Connecting to OSU_PUB Connecting to OSU_PUB DomainDomain

Enable Wireless LAN on your deviceEnable Wireless LAN on your device Go to the internetGo to the internet Browser will redirect you to the wireless security page Browser will redirect you to the wireless security page

for OSU (See next page)for OSU (See next page) Enter login information (See next page)Enter login information (See next page) Enter computer information (See next page)Enter computer information (See next page) Quit browser (15-20 min)Quit browser (15-20 min) SurfSurf Your computer is now permanently registered with Your computer is now permanently registered with

OSU (College of Engineering)OSU (College of Engineering)

Page 30: Slide 1 - classes.bus.oregonstate.edu -
Page 31: Slide 1 - classes.bus.oregonstate.edu -
Page 32: Slide 1 - classes.bus.oregonstate.edu -

Questions?Questions?


Recommended