Wi-Fi Protected Access for Protection and Automation

Size: px
Start display at page:

Download "Wi-Fi Protected Access for Protection and Automation"

Transcription

1 Wi-Fi Protected Access for Protection and Automation a work in progress by CIGRE Working Group B5.22 Dennis K. Holstein on behalf of CIGRE B5.22

2 This is an interactive discussion Who is CIGRE B5.22 What is Wi-Fi as defined by IEEE i Lets get technical WEP is not secure, so we now have WPA Now we have i Context is defined by limited-life keys What has this to do with Electric Power protection and automation Good question: we took a survey What did we learn Good news and bad news

3 CIGRE is one of the leading worldwide Organizations on Electric Power Systems Study Committees are the main players of the technical activities B5 is responsible for studying principles, design, application and management of power system protection, substation control, automation, monitoring and recording Working Groups perform studies clearly specified by Terms of Reference their product is a "Technical Brochure B5.22 was commission to Survey applications using Wi-Fi in protection and automation schemes Assess the mitigation of security vulnerabilities offered by IEEE i on system reliability and performance Recommend design requirements and prioritized security levels needed for Wi-Fi protected access related to critica mission protection and automation functions

4 Typically a Wi-Fi adapter card is embedded or insert nto a computer so data can be sent to other computers or the Internet via a short-range radio link to a Wi-Fi access point Wi-Fi provides simple wireless broadband access market leader in wireless technology Wi-Fi is a brand name coined by the Wi-Fi Alliance Wi-Fi products must be designed using an industry standard, known as IEEE various subgroups within IEEE each one is assigned a letter i subgroup is responsible for developing an amendment the standard specifying security mechanisms for

5 802.11a,b,g and n a operates in the 5 GHz band Transfers 54Mbps Line of sight access because broadcast is directional (travels in only one direction at once) Never was accepted in the market b operates in the 2.4 GHz band Transfers 11Mbps Signal is omnidirectional (broadcasts in all directions at once) g operates in the 2.4 GHz band Transfers 54Mbps b and g are interoperable n solves the instability and interference issues with b & g Adds multiple input/multiple output (MIMO) Orthogonal frequency-division multiplexing (OFDM) Uses several different receiver and transmitter antenna Increased data broadcast simultaneously

6 E n u, w W iginal IEEE did provide a security method reless Equivalent Privacy (WEP) Hacking software AirSnort published on the we WEP security was instantly rendered useless -Fi Protected Access (WPA) was the result Better data encryption Ability to authenticate users on large networks using a separate authentication service such as Remote Authentication Dial-In User Service WPA use of Pre-Shared Keys (PSKs) this is the problem

7 efines a new type of wireless network called Robust Security Network (RSN) Transitional Security Network (TSN) SN and WEP systems can operate in parallel PA and RSN share a common architecture and approac WPA has a subset of capability focused specifically on one way to implement a network RSN allows more flexibility in implementation RSN supports the Advanced Encryption Standard (AE cipher algorithm in addition to Temporal Key Integrity Protocol (TKIP) WPA focuses on TKIP mmon architecture covers procedures such as uppervel authentication, secret key distribution and key newal all which are relevant to both TKIP and AES

8 How to establish and maintain a security context between th wireless LAN devices usually a mobile device and an access point This context is the secret key upon which security heavily relies RSN the security context is defined by the possession of limited-life keys temporal keys Creation of keys is done in real time as the security conte is established, after authentication Updated from time to time Always destroyed when the security context is closed Authentication is based on some shared secret that cannot created automatically basis for all authentication methods is the entity to be authenticated possesses some special information in advance, which is called the master key the master key is rarely, if ever, used directly; it is used t t l k y y

9 Extendibility through Security Layers EP was defined within a gle standard No security layers Poor scaling PA & is based on security layers Wireless LAN layer Access Control layer Authentication layer N can fit into existing curity architectures EE 802.1X deals with rt access control Licensed Server Proxy Server Authentication Server Authenticator Wireless LAN Key Distribution Network(s) Authentication Client Operating System Supplicant Wireless LAN User Authenti Laye Access C Lay Wireless Laye Access Point Mobile Device

10 Some definitions Supplicant: an entity that wants to have access Authenticator: an entity that controls the access gate Authorizer: An entity that decides whether the supplicant is to be admitted 5 steps 1. Authenticator is alerted by the supplicant 2. Supplicant identifies itself 3. Authenticator requests authorization from the authorizer 4. Authorizer indicates YES or NO 5. Authenticator allows or blocks access Supplicant needs a token that proves that it has been authorized Three protocols used for WPA and RSN IEEE 802.1X foundation for WPA and RSN EAP: Extensible Authentication Protocol (RFC2284) RADIUS: Remote Authentication Dial-in Service Method of choice for WPA Optional for RSN

11

12 protection and automation Does you currently use, or plan to use, wireless LAN based on IEEE for substation communications inside the fence? Do security issues have an effect on your decision to not use wireless communications in the substation? Do you feel your utility could benefit by having the capability to get IED technical support at any time regardless of location? Does your utility have a need for local access to the substation IEDs without entering the substation?

13 More survey questions Does your utility have a need for local access to IEDs that are difficult to physically reach because of terrain or environmental conditions? Is your utility concerned about possible security risks in using wireless for mission critical tasks? Has a security risk assessment been performed at your utility that includes possible use of wireless communications for protection and automation? What operational and enterprise applications does your utility use (plan to use) wireless technology?

14 What did we learn Are the security mechanisms adequate YES, but utilities need to enforce two principles The principle of least privilege The principle of deny everything not-specifically-allowed Given the organizational complexities of power system operations can a system that relies on limited-life keys be efficiently managed Depends on the degree of complexity Closed self-contained operations YES Open federated operations - NO

15 n effective security management schem Security Management Center Video Surveillance Firewall/DMZ Satellite Key Material Authentication Key Operations Center Business Functions. Leased Lines Intranet Internet Auditing Admin Network License Server SCADA Radio Communications Authentication Key Key Distribution Modem Local Management Port Substation Key Material Admin Workstation Certificate Authority Key Management Appliance (proxy server) Key Material WAN or Internet Key Distribution Key Material SCM Maintenance Port RTU IED - Relay Maintenance Port Wireless Access Modem MCM Key Material Local Management Port Authentication MCM

16 Organizational complexity

17 f n n

18 q se am I secure? f you use WEP No f you use WPA with passphrases - Yes f you use i - Yes es address access control? NO, see 2.1X a small utility can I efficiently manage the ying material? f you implement a Security Management Center Yes f you use a trusted third-party security manager - Yes on t want stovepipe solutions - does i fit h a comprehensive solution? es, because i implements a layered schema which is caleable ttom line: Do it right and you're secure

19 I m a large complex utility and I need to control access and use privileges Between internal organizations With business partners With support organizations With ISO, government and regulatory agencies Good news: i is secure that s not the problem Good news: If you can force a hierarchical management scheme, a well defined solution is available Bad news: ISO, Government, and Regulatory agencies are the problem You have a management nightmare on your hands A federated, not a hierarchical, scheme is needed A well understood federated management scheme does not exist

How To Get A Power Station To Work With A Power Generator Without A Substation

How To Get A Power Station To Work With A Power Generator Without A Substation Wi-Fi Protected Access for Protection and Automation Key Material Authentication Key Presented to: 13 December 2006 Dennis K. Holstein on behalf of CIGRE B5.22 1 The good news and the bad news Who is CIGRE

More information

Lecture 3. WPA and 802.11i

Lecture 3. WPA and 802.11i Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key

More information

P r o t o l ck w fi ma a n ger User s Guide

P r o t o l ck w fi ma a n ger User s Guide Po rtl wifi oc manager k Portlock WiFi Manager Introduction New in version 5.08 of the Portlock Boot CD is Portlock WiFi Manager, a utility for connecting to wireless networks. It is located on the Portlock

More information

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2

More information

How To Understand The Latest Wireless Networking Technology

How To Understand The Latest Wireless Networking Technology GLOSSARY 802.11 The IEEE standard that specifies carrier sense media access control and physical layer specifications for 1- and 2-megabit-per-second (Mbps) wireless LANs operating in the 2.4-GHz band.

More information

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Patrick McCurdy Product Marketing Manager Phoenix Contact Inc. pmccurdy@phoenixcon.com Ira Sharp Product Specialist Phoenix

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

WLAN Authentication and Data Privacy

WLAN Authentication and Data Privacy WLAN Authentication and Data Privacy Digi Wi-Point 3G supports various Wi-Fi security options, including WEP-40/WEP-104 and WPA- PSK and WPA2-PSK. To configure WLAN security on DIGI WI-POINT 3G, you may

More information

Chapter 2 Wireless Networking Basics

Chapter 2 Wireless Networking Basics Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).

More information

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas.

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas. Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key

More information

Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity)

Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Cyber Security Management for Utility Operations by Dennis K. Holstein (Opus Publishing) and Jose Diaz (Thales esecurity) Abstract Strong identity management enforced with digital authentication mechanisms

More information

Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)

Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights

More information

Certified Wireless Security Professional (CWSP) Course Overview

Certified Wireless Security Professional (CWSP) Course Overview Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption

More information

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis: IMPORTANT! This Guide refers to the following Products: Securing Your Wireless Network Please read the following carefully; Synopsis: This Guide is designed to help you if you have a Wireless Network that

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

How To Secure Wireless Networks

How To Secure Wireless Networks Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without

More information

HP AP8760 Dual Radio 802.11a/b/g Access Point Overview

HP AP8760 Dual Radio 802.11a/b/g Access Point Overview Overview Models JD016A Key features Simultaneous 802.11a and 802.11b/g support PoE power/data via Category 5/6 data cables WPA/2, AES, TKIP, WEP packet encryption MAC address authentication/filtering WDS

More information

Wireless Troubleshooting

Wireless Troubleshooting Wireless Troubleshooting Applicable Version: 10.00 onwards Applicable Models: All WiFi Models - CR15wi, CR15wiNG, CR25wi, CR25wiNG, CR35wi, CR35wiNG Connectivity Issues with Cyberoam Inbuilt Access points

More information

Computer Networks. Secure Systems

Computer Networks. Secure Systems Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

Wireless Security for Mobile Computers

Wireless Security for Mobile Computers A Datalogic Mobile and Summit Data Communications White Paper Original Version: June 2008 Update: March 2009 Protecting Confidential and Sensitive Information It is every retailer s nightmare: An attacker

More information

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS Wireless Data Network Security 1 Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS Wireless Data Network Security for Hospitals: Various Solutions to Meet HIPAA Requirements. Jody Barnes East

More information

UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security

UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

How To Secure A Wireless Network With A Wireless Device (Mb8000)

How To Secure A Wireless Network With A Wireless Device (Mb8000) MB8000 Network Security and Access Control Overview MB8000 employs almost all of the current popular WLAN security mechanisms. These include wireless-user isolation, closed system (by turning off SSID

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

User Guide. E-Series Routers

User Guide. E-Series Routers User Guide E-Series Routers Table of Contents Table of Contents Product overview E900/E1200/E1500/E2500/E3200 1 Back view 1 Bottom view 1 E4200 2 Top view 2 Back view 2 Setting Up Your E-Series Router

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Cisco Aironet 1130G Series IEEE 802.11g Access Point

Cisco Aironet 1130G Series IEEE 802.11g Access Point Cisco Aironet 1130G Series IEEE 802.11g Access Point Low-profile business-class access point with integrated antennas for easy deployment in offices and similar RF environments Product Overview The Cisco

More information

Chapter 6 CDMA/802.11i

Chapter 6 CDMA/802.11i Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

802.1x Networking. tommee pickles Moloch Industries. Moloch.org tommee.net

802.1x Networking. tommee pickles Moloch Industries. Moloch.org tommee.net 802.1x Networking tommee pickles Moloch Industries Moloch.org tommee.net Who am I Fun: Defcon Cannonball Run Work: 15 Years in the grind (MTV, Google, Nature Magazine) Whore: TV and Speaking Engagements

More information

Configuring Security Solutions

Configuring Security Solutions CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from

More information

QuickSpecs. HP M220 802.11n Access Point Series. Models HP M220 802.11n WW Access Point. Key features

QuickSpecs. HP M220 802.11n Access Point Series. Models HP M220 802.11n WW Access Point. Key features Overview HP M220 802.11n Access Point Series Models HP M220 802.11n AM Access Point HP M220 802.11n WW Access Point J9798A J9799A Key features IEEE 802.11a/b/g/n access point Single-radio, dual-band (2.4

More information

Wireless LAN Security Mechanisms

Wireless LAN Security Mechanisms Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group jingan.xu@tu-ilmenau.de, mitsch@tu-ilmenau.de Abstract.

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

Medical Device Connectivity

Medical Device Connectivity Medical Device Connectivity Most medical device manufacturers are implementing 802.11x wireless connectivity. This white paper will identify requirements and provide information to help ensure a successful

More information

CS 356 Lecture 29 Wireless Security. Spring 2013

CS 356 Lecture 29 Wireless Security. Spring 2013 CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003 Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003 2003 Wi-Fi Alliance. Wi-Fi is a registered trademark of the Wi-Fi Alliance

More information

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly

More information

TECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October 2007. Last updated: 11 October 2007. Rev: 1.

TECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October 2007. Last updated: 11 October 2007. Rev: 1. TECHNICAL NOTE REFERENCE DOCUMENT Improving Security for Axis Products Created: 4 October 2007 Last updated: 11 October 2007 Rev: 1.0 TABLE OF CONTENTS 1 INTRODUCTION 3 2 BEST-PRACTICE SECURITY POLICIES

More information

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2) A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2) Vipin Poddar Suresh Gyan Vihar School of Engginering And Technology, Jaipur, Rajasthan. Hitesh Choudhary, Poornima University, Jaipur,

More information

Securing Your Wireless Network

Securing Your Wireless Network Choosing A Wireless Router You might already have a wireless router provided to you by your Internet Service Provider. Otherwise, if you are intending to get one or decide to upgrade your old router, look

More information

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Wireless Networking Basics. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA

Wireless Networking Basics. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA Wireless Networking Basics NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA n/a October 2005 2005 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR and Auto Uplink are trademarks

More information

Wi-Fi Client Device Security & HIPAA Compliance

Wi-Fi Client Device Security & HIPAA Compliance Wi-Fi Client Device Security & HIPAA Compliance Originally Published: September 2010 Updated: October 2012 A White Paper from Laird Technologies Connecting medical devices to a hospital s Wi-Fi network

More information

Huawei WLAN Authentication and Encryption

Huawei WLAN Authentication and Encryption Huawei WLAN Authentication and Encryption The Huawei integrated Wireless Local Area Network (WLAN) solution can provide all-round services for municipalities at various levels and enterprises and institutions

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1.

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1. EPI-3601S Wireless LAN PCI Adapter (802.11g & 802.11b up to 108 Mbps) User Manual Version: 1.2 1 TABLE OF CONTENTS 1 INTRODUCTION...3 2 FEATURES...3 3 PACKAGE CONTENTS...4 4 SYSTEM REQUIREMENTS...5 5 INSTALLATION...5

More information

HP E-M110 Access Point Series. Product overview. Key features. Data sheet

HP E-M110 Access Point Series. Product overview. Key features. Data sheet HP E-M110 Access Point Series Data sheet Product overview HP E-M110 Access Point is an entry-level, single IEEE 802.11a/b/g radio device that can be configured to operate as an access point, a wireless

More information

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless security. Any station within range of the RF receives data Two security mechanism 802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the

More information

The Value of Cisco Compatible Extensions (CCX) for Philips PageWriter Cardiographs

The Value of Cisco Compatible Extensions (CCX) for Philips PageWriter Cardiographs The Value of Cisco Compatible Extensions (CCX) for Philips PageWriter Cardiographs A White Paper from Philips Healthcare and Summit Data Communications February 2009 Philips Healthcare and Summit Data

More information

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security fs@wpi.edu

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security fs@wpi.edu Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security fs@wpi.edu Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks

More information

The Importance of Wireless Security

The Importance of Wireless Security The Importance of Wireless Security Because of the increasing popularity of wireless networks, there is an increasing need for security. This is because unlike wired networks, wireless networks can be

More information

10/18/2010. Learning Objectives. Wireless Security Challenges. Wireless Communication. Typical Wireless Scenario. 802.11 Standards. 802.

10/18/2010. Learning Objectives. Wireless Security Challenges. Wireless Communication. Typical Wireless Scenario. 802.11 Standards. 802. Learning Objectives Wireless Security Challenges ITM 455 Information Security Dr. Sharon Tabor Review basics of wireless communication technology Explore wireless vulnerabilities and challenges Identify

More information

HP M220 802.11n Access Point Series

HP M220 802.11n Access Point Series Data sheet HP M220 802.11n Access Point Series Key features IEEE 802.11a/b/g/n access point Single-radio, dual-band (2.4 GHz or 5 GHz) Simplified wireless LAN administration with clustering technology

More information

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode. 802.11a/n Long Range Wireless Outdoor CPE Key Features IEEE 802.11 a/n compliant Up to 300Mbps (5GHz) 24V Proprietary PoE support Waterproof Housing IP65 rated AP/CB/CR/WDS Modes 4 SSIDs support + VLAN

More information

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com What What is PCI A global forum launched in September 2006 for ongoing enhancement

More information

Cisco RV 120W Wireless-N VPN Firewall

Cisco RV 120W Wireless-N VPN Firewall Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations

More information

DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245

DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245 DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245 E Data Projector Wireless Function Guide Be sure to read the precautions in the User s Guide (Basic Operations) that comes with the Data Projector. Be sure

More information

CS549: Cryptography and Network Security

CS549: Cryptography and Network Security CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

RSSI LED IP-67. Virtual. HTTPS WISP Bridge

RSSI LED IP-67. Virtual. HTTPS WISP Bridge AirMax DUO 802.11a/b/g Dual Radio Base Station T he AirMax DUO is the latest generation of AirLive Outdoor Base Station that incorporates everything we know about wirelessa feat from the company that starts

More information

WHITE PAPER. Enterprise Wireless LAN Security

WHITE PAPER. Enterprise Wireless LAN Security WHITE PAPER Enterprise Wireless LAN Security Preface This paper describes the challenges today s administrators face when planning data protection for their wireless networks. Paramount in this discussion

More information

AC 750. Wireless Dual Band Router. Highlights

AC 750. Wireless Dual Band Router. Highlights AC 750 Wireless Dual Band Router Highlights Fast Wi-Fi 300Mbps on 2.4GHz + 433Mbps on 5GHz totals 733Mbps Wi-Fi speeds Superior Coverage 2 dual band fixed antennas provide incredible Omni-directional wireless

More information

How To Use The Cisco Aironet 1240G Series For A Wireless Network (Wired) And For A Wired Network (Wireless)

How To Use The Cisco Aironet 1240G Series For A Wireless Network (Wired) And For A Wired Network (Wireless) Cisco Aironet 1240G Series Access Point Cisco Aironet 1240G Series Access Points provide single-band 802.11g wireless connectivity for challenging RF environments such as factories, warehouses, and large

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information

Wireless Network Security Challenges

Wireless Network Security Challenges Wireless Network Security Challenges SHARE Summer 2010 Boston Laura Knapp WW Business Consultant Applied Expert Systems (www.aesclever.com) laurak@aesclever.com laura@lauraknapp.com Networking - Connecting

More information

Cisco RV220W Network Security Firewall

Cisco RV220W Network Security Firewall Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and

More information

Linksys WAP300N. User Guide

Linksys WAP300N. User Guide User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating

More information

TRENDnet User s Guide. Cover Page

TRENDnet User s Guide. Cover Page Cover Page Table of Contents Product Overview... 1 Package Contents... 1 Features... 1 Product Hardware Features... 2 Application Diagram... 4 Basic Router Setup... 4 Creating a Home Network... 4 Router

More information

Security Considerations for Cellular 3G Modems & 3G Wireless Routers

Security Considerations for Cellular 3G Modems & 3G Wireless Routers Security Considerations for Cellular 3G Modems & 3G Wireless Routers Roque Thuo Wireless Engineer Rf Wireless, LLC 1616 S. Stapley Dr. Suite103, Mesa AZ 85204 1 About RfWeL RfWeL, Radio Frequency Wireless

More information

Access the GV-IP Camera through a broadband modem

Access the GV-IP Camera through a broadband modem Access the GV-IP Camera through a broadband modem Applied to All GV-IP Cameras Article ID: GV15-12-03-26 Release Date: 03/26/2012 Introduction The document introduces how to connect your GV-IP Camera to

More information

QuickSpecs. Model. Key features Can connect wired device to a wireless network Single radio IEEE 802.11a/b/g Two external antennas Indoor enclosure

QuickSpecs. Model. Key features Can connect wired device to a wireless network Single radio IEEE 802.11a/b/g Two external antennas Indoor enclosure Overview Model HP M111 Client Bridge US HP M111 Client Bridge JP J9389A J9523A Key features Can connect wired device to a wireless network Single radio IEEE 802.11a/b/g Two external antennas Indoor enclosure

More information

Analyzing Wireless LAN Security Overhead

Analyzing Wireless LAN Security Overhead Analyzing Wireless LAN Security Overhead Harold Lars McCarter Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements for the

More information

Security in IEEE 802.11 WLANs

Security in IEEE 802.11 WLANs Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh

More information

Setting up a WiFi Network (WLAN)

Setting up a WiFi Network (WLAN) Setting up a WiFi Network (WLAN) How to set up Wi-Fi on your Huawei E960 InZone Step 1: In the address field on your internet browser, type http://192.168.1.1/ Step 2: Type admin into the Password box

More information

Mobility Task Force. Deliverable B

Mobility Task Force. Deliverable B Mobility Task Force Deliverable B Glossary of technical terms for mobile/roaming/authentication/authorization + Glossary of non technical terms used by this group Version 1.3.5 Editors: Roland Staring,

More information

FD Wi-Fi Terminals. FD100 Ti /200 Ti /300 Ti Quick set-up Guide

FD Wi-Fi Terminals. FD100 Ti /200 Ti /300 Ti Quick set-up Guide FD Wi-Fi Terminals FD100 Ti /200 Ti /300 Ti Quick set-up Guide 31 Thanks for choosing a First Data Wi-Fi terminal. You just purchased a terminal that is Wi-Fi capable allowing you the most flexibility

More information

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN

More information

Wi-Fi Client Device Security and Compliance with PCI DSS

Wi-Fi Client Device Security and Compliance with PCI DSS Wi-Fi Client Device Security and Compliance with PCI DSS A Summit Data Communications White Paper Original Version: June 2008 Update: January 2009 Protecting Payment Card Information It is every retailer

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

EAP350 EAP350. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW

EAP350 EAP350. Long Range Ceiling Mount Access Point PRODUCT OVERVIEW Long Range Ceiling Mount Access Point 2.4 GHz 300Mbps 11b/g/n 29dBm AP/WDS/Repeater PRODUCT OVERVIEW is a 300Mbps wireless-n ceiling mount AP which offers users extended coverage, strong penetration, secure

More information

Design and Implementation Guide. Apple iphone Compatibility

Design and Implementation Guide. Apple iphone Compatibility Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new

More information

How To Manage An 802.11 Wireless Network At A University

How To Manage An 802.11 Wireless Network At A University WIRELESS POLICY 1 INTRODUCTION 1.1 Wireless networking is a fast emerging technology and is set to continue to grow for the foreseeable future. It is recognised that wireless networking could offer benefits

More information

Wireless Network Standard

Wireless Network Standard Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.

More information

A White Paper from Laird Technologies

A White Paper from Laird Technologies Cisco Compatible Extensions and Medical Devices Originally published: July 2012 Updated: October 2012 A White Paper from Laird Technologies While CCX has been an overwhelming success in the laptop world,

More information

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter

More information

Wireless Technology Seminar

Wireless Technology Seminar Wireless Technology Seminar Introduction Adam Worthington Network Consultant Adam.Worthington@euroele.com Wireless LAN Why? Flexible network access for your users? Guest internet access? VoWIP? RFID? Available

More information

Output Power (without antenna) 5GHz 2.4GHz

Output Power (without antenna) 5GHz 2.4GHz Dual Band High- PoE AP Router Dual Band Concurrent AP Router 11a + 11a/b/g Hi- Radios 802.3af PoE Port 7 Wireless Operation Modes 5/10/20 Variable Channel Width Home Digital Network Application School,

More information

Nokia E61i Configuring connection settings

Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or

More information