Wireless Network Security Nate Arnold GE Transportation

55
D E P A R T M E N T O F COMPUTER SCIENCE AND SYSTEMS ANALYSIS SCHOOL OF ENGINEERING & APPLIED SCIENCE O X F O R D O H I O MIAMI UNIVERSITY Wireless Network Security Nate Arnold GE Transportation

description

Wireless Network Security Nate Arnold GE Transportation. Wireless Networks What are they?. A Wireless Network is a system of physically separated devices which communicate via electronic waves in order to share information. Wireless Networks What’s out there?. - PowerPoint PPT Presentation

Transcript of Wireless Network Security Nate Arnold GE Transportation

Page 1: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Network Security

Nate ArnoldGE Transportation

Wireless Network Security

Nate ArnoldGE Transportation

Page 2: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

What are they?Wireless Networks

What are they?

• A Wireless Network is a system of physically separated devices which communicate via electronic waves in order to share information.

Page 3: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

What’s out there?Wireless Networks

What’s out there?

• Approximately 50 different types of wireless networks

• Examples– Cell Phones (GSM, 3GS)– UPS & Fed Ex sending messages using GPRS

and CDMA– 802.11 IEEE standards for WLAN– Satellites (Corporate networks, GPS, Iridium)

Page 4: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Examples of Wireless Networks

Page 5: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

What we will focus onWireless Networks

What we will focus on

• 802.11 IEEE – Current standards– Security– New and future standards– Examples

• Alternate Wireless Network Standards

Page 6: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

• Why go wireless?

– Do the benefits outweigh the risks?

Page 7: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

• Does wireless networking provide business value?

Soft Benefits vs. Hard Benefits

Page 8: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Soft Benefits of a WLAN:• Increased flexibility

• Faster decision making

• Higher employee satisfaction

• Greater accuracy of information

Page 9: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Real world examples of Soft Benefits • University of Illinois at Chicago Medical Center

– 507 beds, Outpatient Care Center, 715 physicians

– Originally 5 different terminals to carry out jobs

– Difficult for IT Dept. to support multiple devices

– Server based WLAN, and wireless computers improved the quality of the care given to patients

Page 10: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Real world examples of Soft Benefits • AOT Financial Services (The Netherlands)

– Amsterdam Options Exchange introduces new electronic trading with wireless access

– AOT provided its traders the with wireless devices and so the ability to make a trade or access market information at the touch of a button

– Results in a 300 percent increase in the speed of trading– 300 percent increase in profits?

Page 11: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Problems with Soft Benefits • Difficult if not impossible to quantify

• Hard to justify expenditure

Page 12: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits • Dollar amount of cost savings

• Measurable increases in productivity

Page 13: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits – Cost savings• Case study of a major national retail chain

with more than 500 stores• Focuses on total cost of ownership of

wireless vs. wired networks in stores • Initial installation, and store

reconfigurations both considered

Page 14: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Page 15: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits - Productivity Gains• Intel IT and Intel Finance collaboration• ROI based model based on the standard

discounted cash flow methodology

ROI = (Productivity benefits – Start-up costs – Sustaining costs)

Page 16: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits – Productivity Gains• Startup costs and Sustaining costs both

relatively easy to measure

• Converting the perceived value to actual ROI is much more difficult

Page 17: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits – Productivity Gains• Method to measure productivity benefits

– WLAN Pilot

• Determine data points

• Establish a baseline

• Segment the users

• Set expectations

Page 18: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits – Productivity Gains• Timesavings = Productivity

• Measuring Timesavings– Intel IT asked users how much time they saved

by using the WLAN and took 25 percent of those estimates to use in its ROI equations.

Page 19: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Page 20: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Page 21: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

WirelessSales

Page 22: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

7 Security Problems of Wireless Networks7 Security Problems of Wireless Networks

• Easy Access

• Rogue Access Points

• Unauthorized Use of Service

• Service and Performance Constraints

• MAC Spoofing and Session Hi-jacking

• Traffic Analysis and Eavesdropping

• Higher Level of Attacks

Page 23: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

802.11 Standards compared802.11 Standards compared

Page 24: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Security Goals of 802.11Security Goals of 802.11

• To protect wireless transmissions that travel over the open radio frequencies.

– Confidentiality: protect data from being intercepted

– Access Control: protect access to private networks

– Data Integrity: prevent tampering with transmitted messages

Page 25: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

802.11 WEP Design Flaws802.11 WEP Design Flaws

• Weak Authentication– Open System

Authentication

– Shared Key Authentication

– MAC Address Filtering

• Weak Encryption– Keystream Reuse

– Improper Key Management

– Short Encryption Keys

– WEP Packet Checksums are not Secure

– WEP is Turned off by Default

Page 26: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Solution for Securing 802.11Solution for Securing 802.11

• 802.1X – Mutual Authentication using Extensible

Authentication Protocols (EAP)

• Wi-Fi Protected Access (WPA) – Enhanced encryption that replaces WEP

Page 27: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

What is EAP?What is EAP?

• EAP stands for Extensible Authentication Protocol that is based on a process rather than an algorithm

• EAP is a one sided authentication protocol

• EAP allows for mutual authentication by running the protocol in both directions

• It is a request-response protocol

• It reduces exposure to key attacks

Page 28: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

The EAP ProtocolsThe EAP Protocols

• EAP-TLS (Transport Layer Security)– Authentication by digital certificates

• PEAP (Protected EAP)– Server side authentication by digital certificate and

client side by user supplied password

• MD5-CHAP– Client side authentication by hashed password

• LEAP (Lightweight EAP)– Proprietary to Cisco – Mutual Authentication with random rekeying

Page 29: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

EAP Authentication ProcessEAP Authentication Process

Page 30: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wi-Fi Protected Access (WPA)Wi-Fi Protected Access (WPA)

• Specification accepted early part of 2003

• Secure implementations of WPA involve– 802.1x infrastructure

• EAP protocol + RADIUS server

– Software upgrades for clients and Access Points

Page 31: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

WPA Security EnhancementsWPA Security Enhancements

• 802.1x– EAP Authentication

• Temporal Key Integrity Protocol (TKIP)– Encryption method using 128 bit rekeying

– Allows different client stations to use different keys to encrypt data

– Key generating function that encrypts every data packet with it own unique key

• Message Integrity Code (MIC)– Checksum that prevents message tampering

Page 32: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

802.11i Standard802.11i Standard

• Approved in August 2004• It incorporates the 802.1x specification• It adds security features

– Temporary Key Integrity Protocol (TKIP)– Advanced Encryption Standard (AES)

• Replacement for WEP• Mathematical ciphering algorithm that uses variable

key lengths (128, 192,256) making it almost impossible to decipher

Page 33: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Newer StandardsNewer Standards

• 802.20 (MBWA) Mobile Broadband Wireless Access

– IEEE may ratify by the end of this year

– Offers blanket coverage to a large city sized area at speeds of 1.5 mbps

– Requires special hardware at cell transmission sites and client devices containing specialized chips

• 802.16 or Wi-Fi Max– Enables a single base station to support fixed and

mobile devices (30 mile radius/70 mbps)

– DSL providers can use this standard to provide last mile delivery of broadband to homes

Page 34: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Newer Standards (2)Newer Standards (2)

• 802.11n “mesh networking” - home use

– IEEE expected to ratify this standard late 2005– Wireless transmissions hop from device to

device - Leaps could reach 100-200 mbps– The first TV to accept this standard is expected

to be released in 2006

Page 35: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

New NetworksNew Networks

• Ultrawideband (UWB) for home use

– Expected to be ratified by IEEE in 2005

– Data transmission rates of 1 gbps

– Shorter transmit range than current Wi-Fi

• Freedom Link by SBC– Combines Wi-Fi and new cellular-data networks

• Voice Over Wi-Fi by Nortel Networks– Makes it possible to use Wi-Fi to make phone calls

over the Web

Page 36: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

WLAN Security Best PracticesWLAN Security Best Practices

1. Educate Employees

2. Personal Firewalls on Mobile Machines

3. Scan for Rogue APs (ex: Netstumbler)

4. Change Default Passwords on APs

5. Turn on and use WEP

6. Avoid Placing APs near walls or windows

7. Reduce Broadcast Strength

8. Use VPN with secondary authentication

Page 37: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

WLAN Security Survey

Page 38: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

IPSec Based VPN

Page 39: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

IPSec Based VPN

Page 40: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

MU CampusMU Campus

Page 41: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

MUnet Wireless LANMUnet Wireless LAN

– IT Services will install a university-wide 802.11 infrastructure over 75% of most heavily trafficked student areas (e.g., study areas, classrooms, and instructional spaces) and over 90% of office and conference areas by June 2005. The residence halls will be the first area to receive the 802.11 infrastructure, with coverage planned for Fall 2004.

– Wireless networking, even with WEP encryption, is inherently insecure. Sensitive data should not be transmitted on a wireless network unless encrypted by the application (e.g. SSL or SSH) or through use of MU's VPN service (see Related Items).

Page 42: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

MU WiFi SecurityMU WiFi Security

Use the MUVPNhttp://software.muohio.edu/

Page 43: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

MUnet Wireless LANMUnet Wireless LAN

• Access point connects to the MU network via 10/100MB Ethernet• 802.11b Compliant

– Uses the FCC unlicensed 2.4 GHz radio frequency• MUnet maintains central administrative control• MUnet requests that use of all other 2.4 GHz devices be discontinued in university-owned buildings• Interference: other wireless LAN devices, cordless telephones, cameras, and audio speakers

Page 44: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

More MU WiFi InfoMore MU WiFi InfoMymiami.muohio.edu

Page 45: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

What is Netstumbler?What is Netstumbler?

• A Windows utility for 802.11b based wireless network auditing– Compatible with Windows 9x, 2000, and XP

• MiniStumbler– Pocket PC 3.0 and 2002. Supports ARM, MIPS and

SH3 CPU types

• More info at netstumbler.com

Page 46: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Who might use Netstumbler?Who might use Netstumbler?

• Security team wanting to check that their corporate LAN isn't wide open• Systems admins wanting to check coverage of their Wireless LAN• Gatherers of demographic information about 802.11 popularity• Drive-by snoopers• Overly curious bystanders

Page 47: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Netstumbler National MapNetstumbler National Map

Page 48: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

NetstumblerNetstumbler

Page 49: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Questions?Questions?

Page 50: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

The following slides include references and extra materialThe following slides include

references and extra material

Page 51: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Reference MaterialsReference Materials• Securing WI-FI Wireless Networks with Today’s Technologies; WI-FI Alliance, 02/06/03, www.wi-

fi.org

•  Enterprise Solutions for Wireless Lan Security; WI-FI Alliance, 02/06/03,

– www.wi-fi.org

•  Intercepting Mobile Communications: The Insecurity of 802.11 –DRAFT-;Nikita Borisov and David WagnerUC Berkley, Ian Goldberg Zero Knowledge Systems.

•  Wireless Security: The Gaps and How to Fill Them; Jeff Moad, Larry Seltzer, Craig Ellison, Gary Bolles, Eweek Enterprise News & Reviews REPORT, 11/25/03

– http://www.eweek.com/article2/0,4149,1507241,00.asp

•  WPA Wireless Security Offers Multiple Advantages over WEP; Brien M. Posey, 08/20/03, www.techrepublic.com

• How the Wi-Fi Future Might Look; Olga Kharif, Business Week Online, 02/18/04

• Then There’s UWB, WIMAX,wOzNet…; Olga Kharif, Business Week Online, 02/18/04

•  Carnival sees world's largest public Wi-Fi network; Anthony Newman, 02/20/04

Page 52: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Reference MaterialsReference Materials• The CIO’s Guide to Mobile Wireless Computing; Citrix; White Paper; 2002 (16)

• Wireless LANs – Linking productivity gains to return on investment; Intel Information Technology; White Paper; December, 2002 (9)

• Assessing the Total Cost of Ownership for Wireless Versus Wired LAN; Syntegra; White Paper; 2003 (6)

• David Spence. Personal Interview. 2/12/04

• Kevin Kessler. Personal Interview. 2/17/04

•  http://ucit.uc.edu/, 2/17/04

•  http://www.netstumbler.com/, 2/17/04

• http://www.nova-data.com/images/, 2/18/04

Page 53: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY802.16 How It Works802.16 How It Works

Page 54: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

IEEE 802.16 ProgressIEEE 802.16 Progress

Work on 802.16 started in July 1999. Four years into its mission, the IEEE 802.16 Working Group on Broadband Wireless Access has delivered a base and three follow-on standards.

IEEE 802.16 (“Air Interface for Fixed Broadband Wireless Access Systems”) was approved in December 2001. This standard is for wireless MANs operating at frequencies between 10 and 66 GHz.

IEEE 802.16.2, published in 2001, specifies a “recommended practice” to address the operation of multiple, different broadband systems in the 10-66 GHz frequency range.

In January of this year, the IEEE approved an amendment to 802.16, called 802.16a, which adds to the original standard operation in licensed and unlicensed frequency bands from 2-11 GHz.

802.16c, which was approved in December 2002, is aimed at improving interoperability by specifying system profiles in the 10-66 GHz range.

 

Page 55: Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

On 11 December 2002, the IEEE Standards Board approved the establishment of IEEE 802.20, the Mobile Broadband Wireless Access (MBWA) Working Group.

•Mission •The mission of IEEE 802.20 is to develop the specification for an efficient packet based air interface that is optimized for the transport of IP based services. The goal is to enable worldwide deployment of affordable, ubiquitous, always-on and interoperable multi-vendor mobile broadband wireless access networks that meet the needs of business and residential end user markets.

MBWA Scope •Specification of physical and medium access control layers of an air interface for interoperable mobile broadband wireless access systems, operating in licensed bands below 3.5 GHz, optimized for IP-data transport, with peak data rates per user in excess of 1 Mbps. It supports various vehicular mobility classes up to 250 Km/h in a MAN environment and targets spectral efficiencies, sustained user data rates and numbers of active users that are all significantly higher than achieved by existing mobile systems

IEEE 802.20 Mission and Project ScopeIEEE 802.20 Mission and Project Scope