SlideShare une entreprise Scribd logo
1  sur  51
Guide to Network Security
First Edition
Chapter Seven
Wireless Network Security
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Objectives
• Identify various wireless technologies and
standards
• Recognize the topology and architecture of
wireless networks
• Define popular wireless security protocols
• Describe various WLAN security concerns
• Discuss the security issues regarding Bluetooth
technology
2
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Introduction
• Definitions of “wireless”
– Signal transmitted using a radiated signal
• Wireless network security is difficult
– Signal is uncontrolled
• Wireless access point (WAP)
– Radio transmitter/receiver
– Takes signal from wired network and broadcasts it to
wireless receivers
• Wireless local area network (WLAN)
– Also called Wi-Fi
3
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Introduction (cont’d.)
• Wireless networks differ from wired networks in
that:
– The signaling method does not have readily
observable boundaries
– They are susceptible to interference from other
devices and networks
– They are less reliable
– The number of devices being networked may
change frequently
– They may lack full connectivity among nodes
– The signal propagation is less certain
4
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Technologies and Standards
• WLANs became popular in the 1990s
– Commercial products connected computers
wirelessly
– Radio transmissions in the 900 mHz band
• Transmission rates about 1 Mbps
• Bandwidths assigned to radio-based
communications began to vary more widely
– 2.4 GHz range
• Data rates up to 54 Mbps
5
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Modulation Technologies
• Modulation
– Method of manipulating the medium signal to carry
data
• Technologies used in wireless communications
– Quadrature amplitude modulation (QAM)
– Quadrature phase shift keying (QPSK)
– Spread-spectrum transmission
6
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Modulation Technologies
(cont’d.)
• QAM
– Combines digital and analog signaling
– Encodes data onto radio signals
– Encodes two message channels at the same time
– Changes amplitude of the two carrier waves
– At least two phases and two amplitudes are used
– See Figure 7-1 for an example
7
© 2013 Course Technology/Cengage Learning. All Rights Reserved 8
Figure 7-1 Quadrature Amplitude Modulation
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Modulation Technologies
(cont’d.)
• QPSK
– Provides multi-bit carrying capability
– Enhancement of Binary Phase Shift Keying
– Uses four signal states 90 degrees out of phase with
each other
• Spread-spectrum transmission advantages over
fixed frequencies
– Reduced narrowband interference
– Signal interception less likely
– Interference minimized
9
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Modulation Technologies
(cont’d.)
• Spread-spectrum technologies
– Frequency hopping spread spectrum (FHSS)
– Direct-sequence spread spectrum (DSSS)
– Orthogonal frequency-division multiplexing (OFDM)
10
© 2013 Course Technology/Cengage Learning. All Rights Reserved
IEEE 802.11 Standards
• Original standard ratified in 1997
• Amended in 1999 with 802.11a and 802.11b
– Clearly defined use of radio transmission methods
– 802.11b became standard in the marketplace
• Amended in 2003 with 802.11g
– Supported data rates up to 54Mbps
– Backwards compatible with 802.11b
• Amended in 2009 with 802.11n
– Security improvements
– Supported data rates to 600Mbps
11
© 2013 Course Technology/Cengage Learning. All Rights Reserved 12
Table 7-1 IEEE 802.11 WLAN Technologies
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wi-Fi Alliance Certifications
• Wi-Fi Alliance
– Group created to certify interoperability of 802.11b
products
– Created Wi-Fi Protected Access (WPA) security
protocol in 2002
• WPA
– Called for supporting Advanced Encryption Standard
• WPA2
– Introduced with ratification of 802.11i amendment
13
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Other Wireless Standards
• Bluetooth
– Open standard for short-range wireless
communication between devices
– Included in IEEE standard 802.15.1
• WiMAX
– Standard for devices in geographically dispersed
facilities
– Range: up to 30 miles
14
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Other Wireless Standards (cont’d.)
• WiMedia
– Wireless Personal Area Network (WPAN) standard
– Low-cost, low-power-consumption network
– Application: wireless USB devices communicate
remotely with host system
• ZigBee
– WPAN standard used for monitoring and control
devices
– Examples of uses: building climate control systems;
shipping container tracking devices
15
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Architectures and Topologies
• Technology standards not enough to create
functional networks
– Must have clearly defined ways of assembling
pieces
• Wireless architectures
– Structured solutions
– No need to prepare each deployment from scratch
16
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Architectures
• Basic building block of wireless network
– Set of clients using wireless connectivity interfaces
connect to a WAP
– WAP provides connection between clients
• And to other networks
• Basic service set (BSS)
– Basic model of wireless clients within defined
network area
– BSS range called basic service area
– See Figure 7-2
17
© 2013 Course Technology/Cengage Learning. All Rights Reserved 18
Figure 7-2 Basic service
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Architectures (cont’d.)
• Distributed system (DS)
– Connects multiple BSSs
– Works as a backbone network
– See Figure 7-3
• Extended service set (ESS)
– Collection of DSs
– See Figure 7-4
19
© 2013 Course Technology/Cengage Learning. All Rights Reserved 20
Figure 7-3 Distributed system
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved 21
Figure 7-4 Extended service
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Topologies
• Network configuration layouts
– Star
– Bus
– Ring
– Hierarchical
– Mesh
– Hybrid
22
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Topologies (cont’d.)
• Star wireless topology
– Also called hub-and-spoke model
– See Figure 7-5 for star topology
• Mesh wireless topology
– All stations on the network are equal peers
– See Figure 7-6 for mesh topology
23
© 2013 Course Technology/Cengage Learning. All Rights Reserved 24
Figure 7-5 Star wireless topology
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved 25
Figure 7-6 Mesh wireless topology
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Topologies (cont’d.)
• Hierarchical wireless topology
– Hierarchy of stars
– Individual stations connect to a WAP
– WAP connects to a higher-level WAP
– Provides larger geographic coverage
– Advantage: increased number of connections
– See Figure 7-7 for hierarchical topology
26
© 2013 Course Technology/Cengage Learning. All Rights Reserved 27
Figure 7-7 Hierarchical wireless topology
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Topologies (cont’d.)
• Hybrid wireless topology
– Combination of star and mesh topology
– See Figure 7-8 for hybrid topology
28
© 2013 Course Technology/Cengage Learning. All Rights Reserved 29
Figure 7-8 Hybrid wireless topology
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Architectures
• Implementation models
– Ad hoc approach
– Permanent, consistent connection points
• Ad hoc implementation
– No formal access points
– Peer-to-peer connection
– At least one station must have WAP connectivity
– Inherently unreliable
30
© 2013 Course Technology/Cengage Learning. All Rights Reserved 31
Figure 7-9 Wireless ad hoc network configuration screens
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Architectures (cont’d.)
• Infrastructure model
– Used by most installed wireless networks
– WAP connected to a wired network
– Provides reliable connectivity
– Provides better scalability than ad-hoc networks
• Connectivity models
– Describes how wireless networks communicate
– Unicast, broadcast, or multicast
32
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Architectures (cont’d.)
• Point-to-point
– Direct link between two stations
– Typically implemented in the ad-hoc manner
– One station configured to allow connection
• Other station initiates connection
• Point-to-multipoint
– Single access point provides connectivity for several
clients within a BSS
– Example: modern wireless phone network
33
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Architectures (cont’d.)
• Mesh multipoint
– Any station can send and receive data from any
other station
– More recent approach to networking
• Roaming
– Provides point-to-multipoint connectivity
– Allows station to move between adjacent BSSs
• Without losing connectivity
– Example: WiMAX
34
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Architectures (cont’d.)
• Mobile hotspot
– Provided by wireless telephony provider
– Allows users to connect wireless devices to specific
commercial wireless service
• Wireless devices can serve as a wireless network
access point relay
– Example: smartphones serving as personal mobile
hotspots
35
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wireless Security Protocols
• Radio transmissions used in WLANs
– Easily intercepted with receiver and packet sniffer
• Networks must use cryptographic security control
• Two sets of protocols in use today
– Wired Equivalent Privacy (WEP)
– Wi-Fi Protected Access (WPA)
36
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wired Equivalent Privacy (WEP)
• Early attempt to provide security with 802.11
network protocol
• Now considered too weak cryptographically
• Reasons for weakness
– No key management defined in protocol
• Keys are seldom changed
– Initialization vector too small
– Tools exist to allow cracking of the WEP key
37
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Wi-Fi Protected Access (WPA and
WPA2)
• Introduced to resolve issues with WEP
• WPA key
– 128 bits
– Dynamically changing
– Uses Temporal Key Integrity Protocol (TKIP)
• Some compromises made to allow backwards
compatibility
• See Table 7-2 for differences between WEP and
WPA
38
© 2013 Course Technology/Cengage Learning. All Rights Reserved 39
Table 7-2 WEP versus WPA
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
WPA2
• Mandatory for all new Wi-Fi devices in 2006
• Designed to meet all 802.11i standard
requirements
• Robust Security Network (RSN)
– Network that only allows connections that provide
encryption
• Notable features of WPA2
– AES-based encryption
– CCMP encryption method
– EAP authentication protocol
40
© 2013 Course Technology/Cengage Learning. All Rights Reserved
WPA2 (cont’d.)
• Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol (CCMP)
– Enhances confidentiality and integrity of wireless
LAN protocols
– No constraint of interoperation with legacy hardware
– Uses a new temporal key every session
– See Figure 7-10
41
© 2013 Course Technology/Cengage Learning. All Rights Reserved 42
Figure 7-10 CCMP encapsulation diagram
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
WPA2 (cont’d.)
• Extensible Authentication Protocol (EAP)
– Framework for device-to-device authentication
– Provides authentication using a wide variety of
authentication methods
• Passwords, certificates, smart cards, tokens
– Can include combinations of techniques
43
© 2013 Course Technology/Cengage Learning. All Rights Reserved
WLAN Security Concerns
• Threats to a secure WLAN
– Rogue access points
– Key cracking
– Wardriving
– ARP poisoning
– DoS attacks
44
© 2013 Course Technology/Cengage Learning. All Rights Reserved
WLAN Security Solutions
• Recommendations for securing wireless networks
– Use WPA2 and strong passkeys
– Employ wireless IDS to help spot rogue access
points
– Use mutual authentication methods like EAP-TLS
– Ensure wireless connections authenticate via a VPN
45
© 2013 Course Technology/Cengage Learning. All Rights Reserved
WLAN Security Myths
• Processes that fail to provide adequate security
– MAC filtering
– SSID hiding
– Disable DHCP
– LEAP authentication
– Signal suppression
46
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Bluetooth
• Wireless communication standard
– Allows devices to communicate within limited range
– Range: depends on type of radio used in the device
• From 3 to 300 feet
• Piconets
– Bluetooth networks
• Key benefits of Bluetooth
– Removes wired cables
– Share and synchronize data
– Serve as an Internet hotspot
47
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Bluetooth Security Concerns
• Consistently criticized as insecure
• Paired devices generate a session key
– Used for all future communications
• Bluetooth attacks
– Bluesnarf
– Bluejacking
– BlueBug
– Evil twin
48
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Bluetooth Security Solutions
• Best practices for Bluetooth security
– Turn off Bluetooth when not using
– Do not accept incoming communications pairing
request unless you know the requester
• Secure Simple Pairing (SSP)
– New security mechanism in Bluetooth 2.1
49
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Summary
• Wireless security is problematic
– Organization can do little to restrict a wireless signal
– Can restrict wireless network’s footprint
• Wireless local area network (WLAN or Wi-Fi)
– Networking nodes connected with the use of radio
waves
• Basic building blocks of the modern WLAN
– Wireless modulation technologies
– IEEE 802.11
50
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Summary (cont’d.)
• Wireless network
– Clients with wireless interface cards connect to a
WAP
• WLANs place data onto radio signal using
modulation techniques
• Wireless network implementation modes
– Ad hoc and permanent, persistent connection points
• Types of wireless network communication
– Point-to-point and point-to-multipoint
51

Contenu connexe

Tendances

Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
nakomuri
 
Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentation
Iftach Ian Amit
 

Tendances (19)

Network topology
Network topologyNetwork topology
Network topology
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo s
 
Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentation
 
Chapter 1 How to Design a LAN
Chapter 1 How to Design a LANChapter 1 How to Design a LAN
Chapter 1 How to Design a LAN
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Performance evolution of automatic switched beam antenna for indoor WLAN syst...
Performance evolution of automatic switched beam antenna for indoor WLAN syst...Performance evolution of automatic switched beam antenna for indoor WLAN syst...
Performance evolution of automatic switched beam antenna for indoor WLAN syst...
 
Optical Networks
Optical NetworksOptical Networks
Optical Networks
 
Network topology and cable's
Network topology and cable'sNetwork topology and cable's
Network topology and cable's
 
Mpls tp as packet platform for critical services in power transmission
Mpls tp as packet platform for critical services in power transmissionMpls tp as packet platform for critical services in power transmission
Mpls tp as packet platform for critical services in power transmission
 
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
 
Network topology architecturea
Network topology architectureaNetwork topology architecturea
Network topology architecturea
 
Network topology architectureb
Network topology architecturebNetwork topology architectureb
Network topology architectureb
 
Network cable
Network cableNetwork cable
Network cable
 
Network and its concepts
Network and its conceptsNetwork and its concepts
Network and its concepts
 
Optical network architecture
Optical network architectureOptical network architecture
Optical network architecture
 
Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...
 
Cables
CablesCables
Cables
 
Wi MAX Technology
Wi MAX TechnologyWi MAX Technology
Wi MAX Technology
 

En vedette

She says culture_final
She says culture_finalShe says culture_final
She says culture_final
SheSaysSG
 
Nonnative species and the stability of desert fish communities
Nonnative species and the stability of desert fish communitiesNonnative species and the stability of desert fish communities
Nonnative species and the stability of desert fish communities
kfritschie
 

En vedette (15)

CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
Ahtosalo_sivulaudatur
Ahtosalo_sivulaudaturAhtosalo_sivulaudatur
Ahtosalo_sivulaudatur
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Rauli Patagonia ciervo ahumado
Rauli Patagonia ciervo ahumadoRauli Patagonia ciervo ahumado
Rauli Patagonia ciervo ahumado
 
Driving Change in Banking - Engagement in the world of empowered individuals
Driving Change in Banking - Engagement in the world of empowered individualsDriving Change in Banking - Engagement in the world of empowered individuals
Driving Change in Banking - Engagement in the world of empowered individuals
 
She says culture_final
She says culture_finalShe says culture_final
She says culture_final
 
Word ch08
Word ch08Word ch08
Word ch08
 
Uncertain future of medicare pass throughs and add-ons
Uncertain future of medicare pass throughs and add-onsUncertain future of medicare pass throughs and add-ons
Uncertain future of medicare pass throughs and add-ons
 
Appropriate Level of Care and the 2– Midnight Rule Where It Stands as of NOW
Appropriate Level of Care and the 2– Midnight Rule Where It Stands as of NOWAppropriate Level of Care and the 2– Midnight Rule Where It Stands as of NOW
Appropriate Level of Care and the 2– Midnight Rule Where It Stands as of NOW
 
Nonnative species and the stability of desert fish communities
Nonnative species and the stability of desert fish communitiesNonnative species and the stability of desert fish communities
Nonnative species and the stability of desert fish communities
 
PowerPoint 2013 ch04
PowerPoint 2013 ch04PowerPoint 2013 ch04
PowerPoint 2013 ch04
 
Healthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were UninsuredHealthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were Uninsured
 
PowerPoint 2013 ch07
PowerPoint 2013 ch07PowerPoint 2013 ch07
PowerPoint 2013 ch07
 
Voter turnout on varansi
Voter turnout on varansi Voter turnout on varansi
Voter turnout on varansi
 
Simkad BestMobile - Apa Itu BestMobile
Simkad BestMobile - Apa Itu BestMobileSimkad BestMobile - Apa Itu BestMobile
Simkad BestMobile - Apa Itu BestMobile
 

Similaire à 9780840024220 ppt ch07

Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
APSU
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
IJERA Editor
 

Similaire à 9780840024220 ppt ch07 (20)

CSIR 5G Testbed
CSIR 5G TestbedCSIR 5G Testbed
CSIR 5G Testbed
 
proposal last.potx
proposal last.potxproposal last.potx
proposal last.potx
 
firewall simenar ppt.pptx
firewall simenar ppt.pptxfirewall simenar ppt.pptx
firewall simenar ppt.pptx
 
9780840024220 ppt ch02
9780840024220 ppt ch029780840024220 ppt ch02
9780840024220 ppt ch02
 
Avaya Networking Solution Overview
Avaya Networking Solution OverviewAvaya Networking Solution Overview
Avaya Networking Solution Overview
 
Introduction to AWSN
Introduction to AWSNIntroduction to AWSN
Introduction to AWSN
 
WIMAN , wireless communication technology
WIMAN , wireless communication technology WIMAN , wireless communication technology
WIMAN , wireless communication technology
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
 
Smart grid technologies
Smart grid technologiesSmart grid technologies
Smart grid technologies
 
Extending Network Virtualization into the Optical Domain
Extending Network Virtualization into the Optical DomainExtending Network Virtualization into the Optical Domain
Extending Network Virtualization into the Optical Domain
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
14 1 qo_s_digitization
14 1 qo_s_digitization14 1 qo_s_digitization
14 1 qo_s_digitization
 
Comm-seminar
Comm-seminarComm-seminar
Comm-seminar
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
 
It107 ch02
It107 ch02It107 ch02
It107 ch02
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
 
adhoc applications.pptx
adhoc applications.pptxadhoc applications.pptx
adhoc applications.pptx
 
Ad Hoc Wireless Network
Ad Hoc Wireless NetworkAd Hoc Wireless Network
Ad Hoc Wireless Network
 
Pranali_d-AWN.pptx
Pranali_d-AWN.pptxPranali_d-AWN.pptx
Pranali_d-AWN.pptx
 
NOMA.pptx
NOMA.pptxNOMA.pptx
NOMA.pptx
 

Plus de Kristin Harrison (20)

9781305119215 rm, 10e ch03
9781305119215 rm, 10e ch039781305119215 rm, 10e ch03
9781305119215 rm, 10e ch03
 
rm, 10e ch02 copy
rm, 10e ch02 copyrm, 10e ch02 copy
rm, 10e ch02 copy
 
9780840024220 ppt ch12
9780840024220 ppt ch129780840024220 ppt ch12
9780840024220 ppt ch12
 
9780840024220 ppt ch11
9780840024220 ppt ch119780840024220 ppt ch11
9780840024220 ppt ch11
 
9780840024220 ppt ch10
9780840024220 ppt ch109780840024220 ppt ch10
9780840024220 ppt ch10
 
9780840024220 ppt ch09
9780840024220 ppt ch099780840024220 ppt ch09
9780840024220 ppt ch09
 
9780840024220 ppt ch08
9780840024220 ppt ch089780840024220 ppt ch08
9780840024220 ppt ch08
 
9780840024220 ppt ch03
9780840024220 ppt ch039780840024220 ppt ch03
9780840024220 ppt ch03
 
9780840024220 ppt ch05
9780840024220 ppt ch059780840024220 ppt ch05
9780840024220 ppt ch05
 
9780840024220 ppt ch04
9780840024220 ppt ch049780840024220 ppt ch04
9780840024220 ppt ch04
 
9780840024220 ppt ch06
9780840024220 ppt ch069780840024220 ppt ch06
9780840024220 ppt ch06
 
9780840024220 ppt ch01
9780840024220 ppt ch019780840024220 ppt ch01
9780840024220 ppt ch01
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

9780840024220 ppt ch07

  • 1. Guide to Network Security First Edition Chapter Seven Wireless Network Security
  • 2. © 2013 Course Technology/Cengage Learning. All Rights Reserved Objectives • Identify various wireless technologies and standards • Recognize the topology and architecture of wireless networks • Define popular wireless security protocols • Describe various WLAN security concerns • Discuss the security issues regarding Bluetooth technology 2
  • 3. © 2013 Course Technology/Cengage Learning. All Rights Reserved Introduction • Definitions of “wireless” – Signal transmitted using a radiated signal • Wireless network security is difficult – Signal is uncontrolled • Wireless access point (WAP) – Radio transmitter/receiver – Takes signal from wired network and broadcasts it to wireless receivers • Wireless local area network (WLAN) – Also called Wi-Fi 3
  • 4. © 2013 Course Technology/Cengage Learning. All Rights Reserved Introduction (cont’d.) • Wireless networks differ from wired networks in that: – The signaling method does not have readily observable boundaries – They are susceptible to interference from other devices and networks – They are less reliable – The number of devices being networked may change frequently – They may lack full connectivity among nodes – The signal propagation is less certain 4
  • 5. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Technologies and Standards • WLANs became popular in the 1990s – Commercial products connected computers wirelessly – Radio transmissions in the 900 mHz band • Transmission rates about 1 Mbps • Bandwidths assigned to radio-based communications began to vary more widely – 2.4 GHz range • Data rates up to 54 Mbps 5
  • 6. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Modulation Technologies • Modulation – Method of manipulating the medium signal to carry data • Technologies used in wireless communications – Quadrature amplitude modulation (QAM) – Quadrature phase shift keying (QPSK) – Spread-spectrum transmission 6
  • 7. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Modulation Technologies (cont’d.) • QAM – Combines digital and analog signaling – Encodes data onto radio signals – Encodes two message channels at the same time – Changes amplitude of the two carrier waves – At least two phases and two amplitudes are used – See Figure 7-1 for an example 7
  • 8. © 2013 Course Technology/Cengage Learning. All Rights Reserved 8 Figure 7-1 Quadrature Amplitude Modulation © Cengage Learning 2013
  • 9. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Modulation Technologies (cont’d.) • QPSK – Provides multi-bit carrying capability – Enhancement of Binary Phase Shift Keying – Uses four signal states 90 degrees out of phase with each other • Spread-spectrum transmission advantages over fixed frequencies – Reduced narrowband interference – Signal interception less likely – Interference minimized 9
  • 10. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Modulation Technologies (cont’d.) • Spread-spectrum technologies – Frequency hopping spread spectrum (FHSS) – Direct-sequence spread spectrum (DSSS) – Orthogonal frequency-division multiplexing (OFDM) 10
  • 11. © 2013 Course Technology/Cengage Learning. All Rights Reserved IEEE 802.11 Standards • Original standard ratified in 1997 • Amended in 1999 with 802.11a and 802.11b – Clearly defined use of radio transmission methods – 802.11b became standard in the marketplace • Amended in 2003 with 802.11g – Supported data rates up to 54Mbps – Backwards compatible with 802.11b • Amended in 2009 with 802.11n – Security improvements – Supported data rates to 600Mbps 11
  • 12. © 2013 Course Technology/Cengage Learning. All Rights Reserved 12 Table 7-1 IEEE 802.11 WLAN Technologies © Cengage Learning 2013
  • 13. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wi-Fi Alliance Certifications • Wi-Fi Alliance – Group created to certify interoperability of 802.11b products – Created Wi-Fi Protected Access (WPA) security protocol in 2002 • WPA – Called for supporting Advanced Encryption Standard • WPA2 – Introduced with ratification of 802.11i amendment 13
  • 14. © 2013 Course Technology/Cengage Learning. All Rights Reserved Other Wireless Standards • Bluetooth – Open standard for short-range wireless communication between devices – Included in IEEE standard 802.15.1 • WiMAX – Standard for devices in geographically dispersed facilities – Range: up to 30 miles 14
  • 15. © 2013 Course Technology/Cengage Learning. All Rights Reserved Other Wireless Standards (cont’d.) • WiMedia – Wireless Personal Area Network (WPAN) standard – Low-cost, low-power-consumption network – Application: wireless USB devices communicate remotely with host system • ZigBee – WPAN standard used for monitoring and control devices – Examples of uses: building climate control systems; shipping container tracking devices 15
  • 16. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Architectures and Topologies • Technology standards not enough to create functional networks – Must have clearly defined ways of assembling pieces • Wireless architectures – Structured solutions – No need to prepare each deployment from scratch 16
  • 17. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Architectures • Basic building block of wireless network – Set of clients using wireless connectivity interfaces connect to a WAP – WAP provides connection between clients • And to other networks • Basic service set (BSS) – Basic model of wireless clients within defined network area – BSS range called basic service area – See Figure 7-2 17
  • 18. © 2013 Course Technology/Cengage Learning. All Rights Reserved 18 Figure 7-2 Basic service © Cengage Learning 2013
  • 19. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Architectures (cont’d.) • Distributed system (DS) – Connects multiple BSSs – Works as a backbone network – See Figure 7-3 • Extended service set (ESS) – Collection of DSs – See Figure 7-4 19
  • 20. © 2013 Course Technology/Cengage Learning. All Rights Reserved 20 Figure 7-3 Distributed system © Cengage Learning 2013
  • 21. © 2013 Course Technology/Cengage Learning. All Rights Reserved 21 Figure 7-4 Extended service © Cengage Learning 2013
  • 22. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Topologies • Network configuration layouts – Star – Bus – Ring – Hierarchical – Mesh – Hybrid 22
  • 23. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Topologies (cont’d.) • Star wireless topology – Also called hub-and-spoke model – See Figure 7-5 for star topology • Mesh wireless topology – All stations on the network are equal peers – See Figure 7-6 for mesh topology 23
  • 24. © 2013 Course Technology/Cengage Learning. All Rights Reserved 24 Figure 7-5 Star wireless topology © Cengage Learning 2013
  • 25. © 2013 Course Technology/Cengage Learning. All Rights Reserved 25 Figure 7-6 Mesh wireless topology © Cengage Learning 2013
  • 26. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Topologies (cont’d.) • Hierarchical wireless topology – Hierarchy of stars – Individual stations connect to a WAP – WAP connects to a higher-level WAP – Provides larger geographic coverage – Advantage: increased number of connections – See Figure 7-7 for hierarchical topology 26
  • 27. © 2013 Course Technology/Cengage Learning. All Rights Reserved 27 Figure 7-7 Hierarchical wireless topology © Cengage Learning 2013
  • 28. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Topologies (cont’d.) • Hybrid wireless topology – Combination of star and mesh topology – See Figure 7-8 for hybrid topology 28
  • 29. © 2013 Course Technology/Cengage Learning. All Rights Reserved 29 Figure 7-8 Hybrid wireless topology © Cengage Learning 2013
  • 30. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Architectures • Implementation models – Ad hoc approach – Permanent, consistent connection points • Ad hoc implementation – No formal access points – Peer-to-peer connection – At least one station must have WAP connectivity – Inherently unreliable 30
  • 31. © 2013 Course Technology/Cengage Learning. All Rights Reserved 31 Figure 7-9 Wireless ad hoc network configuration screens © Cengage Learning 2013
  • 32. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Architectures (cont’d.) • Infrastructure model – Used by most installed wireless networks – WAP connected to a wired network – Provides reliable connectivity – Provides better scalability than ad-hoc networks • Connectivity models – Describes how wireless networks communicate – Unicast, broadcast, or multicast 32
  • 33. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Architectures (cont’d.) • Point-to-point – Direct link between two stations – Typically implemented in the ad-hoc manner – One station configured to allow connection • Other station initiates connection • Point-to-multipoint – Single access point provides connectivity for several clients within a BSS – Example: modern wireless phone network 33
  • 34. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Architectures (cont’d.) • Mesh multipoint – Any station can send and receive data from any other station – More recent approach to networking • Roaming – Provides point-to-multipoint connectivity – Allows station to move between adjacent BSSs • Without losing connectivity – Example: WiMAX 34
  • 35. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Architectures (cont’d.) • Mobile hotspot – Provided by wireless telephony provider – Allows users to connect wireless devices to specific commercial wireless service • Wireless devices can serve as a wireless network access point relay – Example: smartphones serving as personal mobile hotspots 35
  • 36. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wireless Security Protocols • Radio transmissions used in WLANs – Easily intercepted with receiver and packet sniffer • Networks must use cryptographic security control • Two sets of protocols in use today – Wired Equivalent Privacy (WEP) – Wi-Fi Protected Access (WPA) 36
  • 37. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wired Equivalent Privacy (WEP) • Early attempt to provide security with 802.11 network protocol • Now considered too weak cryptographically • Reasons for weakness – No key management defined in protocol • Keys are seldom changed – Initialization vector too small – Tools exist to allow cracking of the WEP key 37
  • 38. © 2013 Course Technology/Cengage Learning. All Rights Reserved Wi-Fi Protected Access (WPA and WPA2) • Introduced to resolve issues with WEP • WPA key – 128 bits – Dynamically changing – Uses Temporal Key Integrity Protocol (TKIP) • Some compromises made to allow backwards compatibility • See Table 7-2 for differences between WEP and WPA 38
  • 39. © 2013 Course Technology/Cengage Learning. All Rights Reserved 39 Table 7-2 WEP versus WPA © Cengage Learning 2013
  • 40. © 2013 Course Technology/Cengage Learning. All Rights Reserved WPA2 • Mandatory for all new Wi-Fi devices in 2006 • Designed to meet all 802.11i standard requirements • Robust Security Network (RSN) – Network that only allows connections that provide encryption • Notable features of WPA2 – AES-based encryption – CCMP encryption method – EAP authentication protocol 40
  • 41. © 2013 Course Technology/Cengage Learning. All Rights Reserved WPA2 (cont’d.) • Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) – Enhances confidentiality and integrity of wireless LAN protocols – No constraint of interoperation with legacy hardware – Uses a new temporal key every session – See Figure 7-10 41
  • 42. © 2013 Course Technology/Cengage Learning. All Rights Reserved 42 Figure 7-10 CCMP encapsulation diagram © Cengage Learning 2013
  • 43. © 2013 Course Technology/Cengage Learning. All Rights Reserved WPA2 (cont’d.) • Extensible Authentication Protocol (EAP) – Framework for device-to-device authentication – Provides authentication using a wide variety of authentication methods • Passwords, certificates, smart cards, tokens – Can include combinations of techniques 43
  • 44. © 2013 Course Technology/Cengage Learning. All Rights Reserved WLAN Security Concerns • Threats to a secure WLAN – Rogue access points – Key cracking – Wardriving – ARP poisoning – DoS attacks 44
  • 45. © 2013 Course Technology/Cengage Learning. All Rights Reserved WLAN Security Solutions • Recommendations for securing wireless networks – Use WPA2 and strong passkeys – Employ wireless IDS to help spot rogue access points – Use mutual authentication methods like EAP-TLS – Ensure wireless connections authenticate via a VPN 45
  • 46. © 2013 Course Technology/Cengage Learning. All Rights Reserved WLAN Security Myths • Processes that fail to provide adequate security – MAC filtering – SSID hiding – Disable DHCP – LEAP authentication – Signal suppression 46
  • 47. © 2013 Course Technology/Cengage Learning. All Rights Reserved Bluetooth • Wireless communication standard – Allows devices to communicate within limited range – Range: depends on type of radio used in the device • From 3 to 300 feet • Piconets – Bluetooth networks • Key benefits of Bluetooth – Removes wired cables – Share and synchronize data – Serve as an Internet hotspot 47
  • 48. © 2013 Course Technology/Cengage Learning. All Rights Reserved Bluetooth Security Concerns • Consistently criticized as insecure • Paired devices generate a session key – Used for all future communications • Bluetooth attacks – Bluesnarf – Bluejacking – BlueBug – Evil twin 48
  • 49. © 2013 Course Technology/Cengage Learning. All Rights Reserved Bluetooth Security Solutions • Best practices for Bluetooth security – Turn off Bluetooth when not using – Do not accept incoming communications pairing request unless you know the requester • Secure Simple Pairing (SSP) – New security mechanism in Bluetooth 2.1 49
  • 50. © 2013 Course Technology/Cengage Learning. All Rights Reserved Summary • Wireless security is problematic – Organization can do little to restrict a wireless signal – Can restrict wireless network’s footprint • Wireless local area network (WLAN or Wi-Fi) – Networking nodes connected with the use of radio waves • Basic building blocks of the modern WLAN – Wireless modulation technologies – IEEE 802.11 50
  • 51. © 2013 Course Technology/Cengage Learning. All Rights Reserved Summary (cont’d.) • Wireless network – Clients with wireless interface cards connect to a WAP • WLANs place data onto radio signal using modulation techniques • Wireless network implementation modes – Ad hoc and permanent, persistent connection points • Types of wireless network communication – Point-to-point and point-to-multipoint 51