CIT 380: Securing Computer Systems

CIT 380: Securing Computer Systems

Wireless Security

Topics

1. Wireless Fundamentals 2. Wireless Discovery 3. WEP Insecurity 4. WAP2 Security

Welcome to Wireless

Radio waves

Security concerns

? No need to be physically plugged into the network.

? Radio signals leaking outside buildings (sniffing).

? Unlicensed spectrum in the 2.4 and 5 GHz ranges.

? Detection of unauthorized devices.

Coverage

? Personal Area Network (PAN). ? Local Area Network (WLAN). ? Metropolitan Area Network

(MAN).

? Intercepting wireless communications.

? Man-in-the-middle attacks. ? Verification of users. ? Restricting access.

11/21/2013

Wireless Networks 3

IEEE 802.11

Family of IEEE networking standards for creating wireless local area networks.

Standard Year Frequency

802.11a 1999 5 GHz 802.11b 1999 2.4 GHz 802.11g 2003 2.4 GHz 802.11n 2009 2.4 and 5 GHz 802.11ac 2014 5 GHz 802.11ad 2012 2.4, 5, and 60 GHz

Data Rate Per Stream 54 Mbps 11 Mbps 54 Mbps 150 Mbps 867 Mbps 6912 Mbps

Allowable Streams

1 1 1 4 8

802.11 in the OSI Model

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download