140 likes | 233 Views
Security in Wireless Network. MSIT 526 Cuong Quoc Le December 15, 2005. Overview. Popularity of Wireless Networks Benefits of Wireless Networks Vulnerabilities in Wireless Networks Some solutions to enhance security in wireless networks. Popularity of Wireless Networks.
E N D
Security inWireless Network MSIT 526 Cuong Quoc Le December 15, 2005
Overview • Popularity of Wireless Networks • Benefits of Wireless Networks • Vulnerabilities in Wireless Networks • Some solutions to enhance security in wireless networks
Popularity of Wireless Networks • Executives of 180 firms using more than 500 personal computers, 40 percent have already implemented wireless networks, while another 31 percent plan on rolling out wireless support in the next 18 months. (Wireless Ethernet Compatibility Alliance) • More than 1 million WLAN access points are in use by more than 700,000 U.S. enterprises. (Yankee Group in Boston)
Wireless technologies allow devices to communicate without physical connections • All data transmission is traveling over the medium of radio frequency • wireless technologies are currently from one main standard: 802.11 • The 802.11b standard is the first WLAN standard • Other newer standards: 802.11a, 802.11g, 802.11n …etc Wireless Technologies
User Mobility: users now can be mobile yet retain high-speed, real-time access to the enterprise LAN • Rapid Installation: time required for installation is reduced tremendously • Flexibility: enterprises can now install and take down WLANs in their locations easily • Scalability: WLAN network topologies can easily be configured to adapt specific business applications needs Benefits of WLANs
Vulnerabilities in WLAN • Easy Access • Rogue Access Points • Unauthorized Use of Service • Service and Performance Constraints • MAC Spoofing and Session Hijacking • Traffic Analysis and Eavesdropping • Higher Level Attacks
Security Breaches • Best Buy Co. ran into trouble in the spring of 2002 when customers who had purchased WLAN cards from Best Buy installed the cards in their laptops before they left the parking lot. The customers noticed unencrypted WLAN traffic that contained customer information and possibly credit card numbers.” (Ohrtman and Roeder) • Netstumbler to identify unsafe WLANs
Security Breaches: Methods • Wardriving • Airsnort & WEPcrack passively monitor transmissions and compute the encryption key when enough packets have been gathered
How to Secure WLAN • Enforce Strong Access Control • Regular Site Audits • Design and Audit for Strong Authentication • Authenticity • Nonrepudiation • Accountability • Adopt Strong Protocols • Perform Risk Analysis • Protect the Core from the Wireless LAN
Conclusion • The only truly secure network is the one never built • WLAN 802.11 protocols are still evolving to meet the needs of businesses • more vigilant due to new and open security holes when deploying wireless technologies Even though WLAN are becoming popular and a cost-effective alternative to traditional wired networks, reasonable precautions and vigilance must be taken in order to make wireless networks safe